Security Strategy Recommendations document to defend the IT enterprise

Security Strategy Recommendations document to defend the IT enterprise

This is a paper that is focusing on the Security Strategy Recommendations document to defend the IT enterprise. The paper also provides additional information to use in the writing of the assignment paper. Below is the assessment description to follow:

Security Strategy Recommendations document to defend the IT enterprise

Overview:

Now that the After Action Reports have been analyzed, the consultants must develop a plan for improving the security posture at Sifers-Grayson. This will be in a Security Strategy Recommendations document. The security strategy will be based upon multiple layers of policies, processes, and technologies that, when implemented, will be used to defend the Information Technology enterprise from both internal and external threats and attacks.

Note: see https://www.techrepublic.com/blog/it-security/understanding-layered-security-and-defense-in-depth/ for a discussion of the differences between these two security strategies: layered security and defense-in-depth. You will need this information for the Security Strategies section of your paper.

Two defensive security strategies have been chosen by the senior members of the team.

1. Defense Strategy #1: Build a DMZ for the R&D Center. The DMZ will host servers accessed by the engineers while teleworking and while reaching back to the R&D center from the test range. The DMZ will require the following: (a) business class routers, (b) business class firewalls, and (c) intrusion detection and prevention system.

Demilitarized Zone (DMZ). For definitions and diagrams see https://www.us-cert.gov/ics/Control_System_Security_DMZ-Definition.html and https://fedvte.usalearning.gov/courses/Security+_v401/course/videos/pdf/Security+_v401_D02_S04_T04_STEP.pdf

2. Defense Strategy #2: Implement Enterprise-wide Protective and Detective Measures to defend against both internal and external attackers. These measures will include (a) controlling access to software documentation and source code, (b) implementing enterprise-wide identity management, and (c) implementing either a Security Information and Event Management (SIEM) tool or a Unified Threat Management (UTM) tool.

Remember, ensure that the pages are exclusive of the cover and the reference pages. Also, ensure that you include all the references you use in finding research for this assignment paper. References should be at least three for the paper. All references, citation, and writing should follow the APA formatting and styling guidelines. Finally, ensure you focus on the assignment topic in detail.

 

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *