ASM Security
ASM Security
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Grading grid
P5 P6 P7 P8 M3 M4 M5 D2 D3
1
Summative Feedback: Resubmission Feedback:
1
Table of Contents
Task 1 - Review the risk assessment process in an organization (P5)........................................................................... 4
1. Identify security risks and how to perform a risk assessment ............................................................................... 4
1.1. Security risks .................................................................................................................................................. 4
1.2. Risk assessment .............................................................................................................................................. 4
2. Identify assets, threats, and threat identification and placement processes ........................................................... 4
2.1. Assets.............................................................................................................................................................. 4
2.2. Threats ............................................................................................................................................................ 6
2.3. Threat identification ....................................................................................................................................... 6
3. List risk identification steps................................................................................................................................... 6
3.1. Identification................................................................................................................................................... 7
3.2. Assessment ..................................................................................................................................................... 7
3.3. Mitigation ....................................................................................................................................................... 7
3.4. Prevention ....................................................................................................................................................... 7
4. Review risk assessment procedures in an organization ......................................................................................... 7
Task 2 - Explain data protection processes and regulations as applicable to an organisation (P6) ............................... 8
2. Explain data protection process ............................................................................................................................. 9
3. Why are data protection and security regulation important? ................................................................................... 10
Task 3 - Design a suitable security policy for an organisation, including the main components of an organisational
disaster recovery plan (P7) .......................................................................................................................................... 11
1. Define a security policy and discuss about it ...................................................................................................... 11
2. Give an example for each of the policies ............................................................................................................ 12
2.1. Firewall Rules Policy: .................................................................................................................................. 12
2.2. Intrusion Prevention policy .......................................................................................................................... 14
2.3. Secure Communication Policy ..................................................................................................................... 14
2.4. Live Update policy ....................................................................................................................................... 15
3. Give the must and should that must exist while creating a policy....................................................................... 16
4. Explain and write down elements of a security policy, including the main components of an organisational
disaster recovery plan .............................................................................................................................................. 18
2
5. Give the steps to design a policy ......................................................................................................................... 20
Task 4 - Discuss the roles of stakeholders in the organisation in implementing security audits (P8) ......................... 23
1. Define stakeholders ............................................................................................................................................. 23
2. What are their roles in an organization? .............................................................................................................. 24
3. Define security audit and state why you need it .................................................................................................. 26
4. Recommend the implementation of security audit to stakeholders in an organization ....................................... 27
REFERENCES ............................................................................................................................................................ 29
Table of Figure
Figure 1: Data protection .............................................................................................................................................. 9
Figure 2: Security policy .............................................................................................................................................. 11
Figure 3: Firewall Rules Policy ..................................................................................................................................... 13
Figure 4: Intrustion Prevention policy ......................................................................................................................... 14
Figure 5: Secure Communication Policy ...................................................................................................................... 15
Figure 6: LiveUpdate policy ......................................................................................................................................... 16
Figure 7: Detemine the problem ................................................................................................................................. 21
Figure 8: Problem Formulation ................................................................................................................................... 21
Figure 9: Scenario Evaluation ...................................................................................................................................... 22
Figure 10: Make a decision .......................................................................................................................................... 23
Figure 11: Stakeholdes ................................................................................................................................................ 24
3
Task 1 - Review the risk assessment process in an organization (P5)
2.1. Assets
An asset is any data, device, or other component of the environment that supports informationrelated
activities in information security, computer security, and network security. Hardware (e.g., servers and
switches), software (e.g., mission important applications and support systems), and private information are
examples of assets. Assets should be safeguarded against unauthorized access, use, disclosure, alteration,
destruction, and/or theft, which might result in loss to the organization.
4
Types of asset:
• Information assets:
This category includes all information regarding your organization. This data has been collected,
categorised, arranged, and stored in a variety of formats. Databases include data on your customers,
employees, production, sales, marketing, and finances. This information is important to your company's
success. Its secrecy, integrity, and availability are critical.
Data files: Transactional data that provides current information on each occurrence. Procedures for
operational and support: These have evolved over time and include thorough instructions on how to carry
out various operations.
Information from the past: Old information that may be required by law to be kept. Continuation plans and
fallback preparations would be devised to overcome any calamity and ensure company continuity. In the
absence of these, ad hoc decisions will be made during a crisis.
• Software assets:
Application software: Application software executes the organization's business rules. The development of
application software takes time. The integrity of application software is critical. Any defect in the
application software might have a negative influence on the business.
System software: An enterprise would invest in a variety of packaged software applications such as
operating systems, database management systems (DBMS), development tools and utilities, software
packages, office productivity suites, and so on.
• Physical assets: These are the visible and tactile items that may include:
Computer hardware: mainframe computers, servers, desktop computers, and laptop computers.
Modems, routers, EPABXs, and fax machines are examples of communication equipment. Magnetic
tapes, disks, CDs, and DATs are examples of storage medium. Power supply and air conditioners are
examples of technical equipment. Fixtures and furniture.
5
2.2. Threats
A threat is anything that may cause danger, loss, or risk to the assets, operations, or security of an
organization or individual. These can be events, conditions, or behaviors that can cause loss, deterioration,
or endangerment of an organization's systems, data, or processes. Threats can include cyber attacks,
security breaches, data loss, natural incidents such as fire or natural disasters, or even improper behavior
from employees.
A threat that is repeated in response to a fresh or newly found occurrence that has the potential to harm a
system or your organization as a whole. Threats are classified into three types:
Physical Threat: Includes any incident or hazard to the facility, such as fire, flood, natural disaster, or
mechanical failure.
Digital or cyber threats: Relates to any risks associated with computer systems and information, including
computer viruses, hacker attacks, data loss or system failure.
Threats to humans or society: Includes any threatening or harmful behavior from humans, such as fraud,
cybercrime, or national security risks.
6
implementation. As a result, completing an assessment is an essential component of an organization's risk
management strategy. (adserosecurity, n.d.)
The depth of risk assessment models is affected by factors like as size, growth rate, resources, and asset
portfolio. When faced with money or time restrictions, organizations might conduct generic evaluations.
Generalized assessments, on the other hand, may not always give thorough mappings between assets, related
threats, recognized risks, effects, and mitigation mechanisms.
3.1. Identification
Determine all of the technological infrastructure's important assets. Next, examine the sensitive data
generated, held, or sent by these assets. Make a risk profile for each one.
3.2. Assessment
Implement a strategy for assessing the identified security threats for important assets. Determine ways to
effectively and efficiently deploy time and resources to risk reduction after comprehensive review and
assessment. The assessment technique or strategy must examine the relationship between assets, threats,
vulnerabilities, and mitigating controls.
3.3. Mitigation
Define a risk mitigation strategy and implement security measures for each risk.
3.4. Prevention
Implement tools and practices to reduce the likelihood of threats and vulnerabilities occurring in your firm's
resources.
7
• Risk Identification: It is the process of determining what, where, when, why, and how something may
impair a company's capacity to function. For example, a company in central California would list "the
likelihood of wildfire" as an event that could disrupt operations.
• Risk Analysis: This phase entails determining the likelihood that a risk event will occur as well as the
probable outcomes of each occurrence. Using the California wildfire as an example, safety managers may
examine how much rain fell in the previous 12 months and the level of damage the organization could suffer
if a fire broke out.
• Risk Evaluation: Risk evaluation assesses the amount of each risk and ranks them based on prominence
and consequence. For example, the consequences of a potential wildfire may be balanced against the
consequences of a potential mudslide. Whichever event is assessed to have a larger likelihood of occurring
and causing harm ranks higher.
• Risk Management: Risk management is also known as risk response planning. Based on the estimated
value of each risk, risk mitigation techniques, preventative treatment, and contingency plans are developed
in this stage. In the case of a wildfire, risk managers may decide to keep extra network servers offsite so that
corporate activities may continue even if an onsite server is damaged. Employee evacuation plans may also
be developed by the risk management.
• Risk Monitoring: It is a continuous process that adjusts and develops over time. Repeating and
continuously monitoring the procedures can assist ensure that all known and unknown hazards are covered.
Task 2 - Explain data protection processes and regulations as applicable to an organisation (P6)
Data protection is the process of protecting critical data from corruption, compromise, or loss, and
providing the ability to restore data to a functional state if something happens to make the data
inaccessible. accessible or unusable. Data protection ensures that data is not corrupted, is accessible only
for authorized purposes, and complies with applicable legal or regulatory requirements. Protected data
must be available when needed and usable for the intended purpose. However, the scope of data protection
goes beyond the concept of data availability and usability to include includes areas such as data
immutability, preservation, and deletion/destruction. Roughly speaking, data protection includes three
8
main types, namely traditional data protection (such as backups and restores). recovery), data security and
data privacy. The processes and technologies used to protect and secure data can be considered data
protection mechanisms and business practices to achieve the overall goal of continuous availability and
immutability. of critical business data. (SNIA, 2023)
9
Implement Security Measures: Based on risk assessment, deploy appropriate security measures and
tools to protect data. May include encryption, access controls, firewalls, antivirus software, and
periodic updates.
Data Preservation and Destruction: Establish policies and procedures for data preservation and
destruction. Remove data that is no longer needed securely and in compliance with legal
requirements.
Monitoring and Incident Response: Implement monitoring tools and processes to detect any
suspicious activity or security breaches. Develop a response plan to immediately remediate any
security breach or incident.
Second, failing to comply with personal data privacy standards can lead to much worse consequences, such
as removing all funds from a person's bank account or even causing a lifethreatening scenario by altering
health information.
Third, data protection rules are required to ensure fair and consumer-friendly commerce and service
offering. Personal data protection legislation create a system in which, for example, personal data cannot be
freely traded, giving consumers more control over who makes them offers and what type of offers they
make.
10
Task 3 - Design a suitable security policy for an organisation, including the main components of an
organisational disaster recovery plan (P7)
Security policies are crucial because they safeguard an organization's physical and digital assets.
They identify all of the company's assets as well as any risks to those assets.
11
• Physical security rules are designed to safeguard a company's physical assets, such as buildings and
equipment, such as computers and other IT equipment. Data security rules safeguard intellectual property
from expensive incidents such as data breaches and data leaks.
Physical security rules safeguard an organization's physical assets, which include buildings, cars,
inventories, and machinery. IT equipment such as servers, computers, and hard drives are examples of these
assets.
IT physical asset protection is very critical since physical equipment carry firm data. If a physical IT asset
is compromised, the data it stores and manages is jeopardized. To keep firm data safe, information security
policies rely on physical security standards.
Breach of security is unavoidable. Critical judgments and defensive actions must be made quickly and
precisely. A security policy specifies what must be done to safeguard data kept on computers. A well-written
policy defines the "what" to accomplish so that the "how" may be recognized, assessed, or evaluated.
Without a security policy, any company is vulnerable to the outside world. It is vital to note that in order to
define your policy requirements, you must first do a risk assessment. This may need an organization defining
levels of sensitivity for information, processes, procedures, and systems.
12
Figure 3: Firewall Rules Policy
There should be rules and enforcement policies that change depending on the kind of firewall and network
resource deployment, such as:
• In the case of dedicated server access, an application proxy firewall must be installed between the remote
user and the dedicated server to conceal the server's identity.
• Second, if traffic filtering is required based on source and destination IP/Port addresses, packet-filtering
firewall placement is highly beneficial and improves transmission speed.
• When speed is not an issue, state table (stately inspection firewall) filters configuration at the network is a
good choice since it dynamically checks the connection and passes the packet.
• Furthermore, NAT should be used because it supplements the usage of firewalls in providing an additional
level of security for an organization's internal network, particularly in avoiding DDOS or multiple SYN
flooding assaults.
• IP packet filtering can be used if you want a higher level of control than that provided by prohibiting an
IP address from talking with your server.
13
2.2. Intrusion Prevention policy
This policy identifies and stops network and browser assaults automatically. It also safeguards apps against
vulnerabilities. It examines the contents of one or more data packages and detects malware that has entered
the system legally.
14
Figure 5: Secure Communication Policy
15
Figure 6: LiveUpdate policy
3. Give the must and should that must exist while creating a policy
When creating a policy, especially a security policy, there are important elements that must be present to
ensure its effectiveness:
Required Ingredients:
Objective and Scope: Clearly define the objective of the policy and its scope of application. They
need to specify what the policy is intended to achieve and the areas it covers within the
organization.
16
Roles and Responsibilities: Outline the roles and responsibilities of individuals or departments
related to the policy. Clearly identify who is responsible for various aspects of policy compliance
and implementation.
Acceptable Use: Set clear guidelines for the use of resources, technology and data within the
organization. Determine what actions are allowed and what actions are prohibited.
Data Protection and Disposal: Establish protocols to protect sensitive data, including encryption,
access control, storage and disposal of data when no longer needed.
Access Control and Authentication: Identify measures to control access to systems, applications,
and data. Includes guidance on user authentication, password management, and access rights.
Case Response Plan: Develop a plan that describes the steps to take when a security incident or
breach occurs. Includes reporting procedures, control steps, investigation and recovery processes.
Legal and Regulatory Compliance: Ensure policy compliance with laws, regulations and industry
standards applicable to the organization's operations.
Recommended Ingredients:
Employee Training and Awareness: Provide training and awareness programs to educate
employees about the policy, its importance, and their responsibilities.
Periodic Review and Updates: Schedule periodic reviews of the policy to ensure it remains
relevant and effective. Update policies as needed to respond to new threats or regulatory changes.
17
Implementation and Consequences: Clearly identify the consequences of policy violations and
implementation measures. This may include disciplinary action or legal consequences for non-
compliance.
Support from Senior Management: Ensure support from senior management, demonstrating
commitment to policy implementation. This helps build a culture of compliance throughout the
organization.
4. Explain and write down elements of a security policy, including the main components of an
organisational disaster recovery plan
A security policy may be as comprehensive as you want it to be, but it must be enforced in its whole,
including everything from IT security to the protection of connected physical assets. The following list
contains some critical factors to consider while building an information security policy. Purpose:
• Detect and avoid information security breaches such as network usage, data, applications, and computer
systems.
• Maintain the organization's reputation while adhering to ethical and legal obligations.
• Customer rights must be respected, including how to respond to noncompliance inquiries and complaints.
Audience: Define the security group to which the Security Policy applies. You can also define which
audiences are not covered by the policy (for example, personnel in another business unit that controls
security independently may not be covered by the policy).
18
• Individuals with access to data and information assets must maintain confidentiality.
• Data should be intact, correct, and complete, and IT systems should be kept operational.
• A senior manager may have the authority to decide with whom and what data can be shared
in a hierarchical manner. A senior manager's vocabulary for security rules may differ from that of a junior
employee. The policy should define the amount of power over data and IT systems for each organizational
role.
• Users can access corporate networks and servers only through specialized logins that require
authentication, such as passwords, biometrics, ID cards, or tokens. You should monitor all systems and log
all attempts to log in.
Data classification: The policy should categorize data into categories such as "top secret," "secret,"
"confidential," and "public." Your goal in categorizing data is to:
• guarantee that sensitive material is not accessible to those with lesser clearance levels;
• secure very important data while avoiding unnecessary security procedures for inconsequential data.
• Data security legislation – systems that hold personal or sensitive data must be safeguarded in accordance
with operational guidelines, best practices, industry enforcement requirements, and relevant regulations.
Encryption, a firewall, and virus protection are among the security needs.
• Data backup-encrypt data backup in accordance with industry best standards. Securely store media, or
migrate backup to safe cloud storage.
• Only data communication over secure protocols is allowed for file movement. Encrypt all information
copied to portable devices or delivered over a public network.
19
Security awareness and behavior:
• Social engineering—emphasize the hazards of social engineering assaults (such as phishing emails).
Employees should be held accountable for detecting, preventing, and reporting such assaults.17
• Clean desk policy—use a cable lock to protect computers. Documents that are no longer needed should be
shredded. Keep printer locations tidy to avoid papers falling into the wrong hands.
• Internet usage policy that is acceptable—define how the Internet should be regulated. Do you allow
YouTube and other social media websites? Using a proxy, you may block undesirable websites.
Responsibilities, rights, and duties of personnel: Appoint personnel to do user access checks, education,
change management, incident management, security policy execution, and periodic updates. As part of the
security policy, responsibilities should be clearly specified.
The first stage in policy design is to formulate the problem to be addressed in order to legitimize it as a
community-wide concern. Typically, the public raises a problem in response to a need or a gap in service
delivery. The investigation of current policies to identify how they have dealt with the problem/issue to date
is therefore a useful starting point. Furthermore, identifying the stakeholders and actors affected by the issue
aids in understanding the magnitude of the problem and who to involve in collaborative problem-solving.
20
Figure 7: Detemine the problem
Once the problem has been recognized, the hypotheses have been proven, and the goals and objectives have
been determined and discussed with the greater community, policy formulation may begin. Policy
formulation seeks to identify and mobilize a set of solution alternatives in connection to the issue, with the
goal of determining which option is best suited to handle the problem in light of available resources and
current restrictions. The creation of scenarios (both written and visual) can aid in the comprehension and
development of alternate methods and actions.
Once scenarios are created to reflect several policy alternatives for dealing with the identified problem, the
optimal option in terms of strategies and actions may be selected. Scenarios analysis also includes the
21
(re)tuning of current policy acts, which is done through short experiments (pilot tests) and public debate.
On-the-ground experiments often aim to test various solutions on a small scale in order to determine
potential implications, which may be a time-consuming and costly operation. In many circumstances, it may
be able to simulate visualisations for various policy alternatives in order to investigate the implications
digitally.
To make a decision, a clear description of the problem, the policy and its scenario, and public acceptance of
the policy must be prepared for presentation and discussion within the public unit accountable for the
decision. The process narrative is relevant to the decision: how the problem was explored, how data was
collected and used, how goals and objectives were identified and translated into strategies and actions, how
impacts were simulated and computed, why some options were preferred over others, and what the public's
contribution to the entire process was. When a decision has been made and the policy is ready for
implementation.
22
Figure 10: Make a decision
Task 4 - Discuss the roles of stakeholders in the organisation in implementing security audits (P8)
1. Define stakeholders
A stakeholder is an individual, group or organization affected by the outcome of a project or business
activity. Stakeholders have an interest in the success of the project and may be inside or outside the
organization sponsoring the project. Stakeholders are important because they can have a positive or
negative influence on the project with their decisions. There are also important or key stakeholders whose
support is needed for the project to survive. A stakeholder is an individual, just like any other member of
the project, and some are easier to manage than others. You will have to learn how to use stakeholder
mapping techniques to identify who your key stakeholders are and ensure you meet their requirements.
(Landau, 2022)
23
Figure 11: Stakeholdes
Investors/Shareholders:
Staff:
24
Customer:
Supplier/Partner:
Government/Regulatory Agencies:
Community:
Manager/Director:
Board of manager:
25
Ensure the organization operates in the best interests of shareholders and stakeholders.
Partners/Associations:
Competitors:
Detect vulnerabilities and risks: Auditing helps detect security vulnerabilities in organizational
systems or processes, thereby identifying potential risks that can be attacked or violated.
Enhance system security: Provide necessary information to improve security measures, adjust
policies and procedures, thereby improving the overall security level of the organization.
26
Preventing attacks and information loss: By identifying and remediating vulnerabilities, auditing
helps prevent potential attacks and reduces the risk of loss of important information.
Identify unusual events and respond quickly: Audits provide the opportunity to develop incident
response plans, helping organizations respond quickly and effectively when a security incident
occurs.
Building trust from customers and partners: There is evidence that the organization places high
security in information deployment and management, thereby creating trust from customers and
partners.
Understanding Stakeholders:
Understand clearly the roles, interests, and perspectives of each stakeholder in the organization.
Assess how implementing security audits will affect them and the benefits they can gain.
27
Proving Practical Benefits:
Use specific examples or case studies to illustrate the specific benefits that security audits have
brought to similar organizations.
Evaluate success cases and learning points from organizations that have successfully implemented
security audits.
Use language appropriate to each stakeholder. For example, with the engineering department, the
focus is on methods and technology; with management, focusing on strategic risks and benefits.
A detailed description of how to implement a security audit, including steps, required resources,
and implementation plan.
Propose an implementation plan based on standard procedures and effective testing methods.
Provide an estimate of the budget required for implementing security audits and the expected
benefits from the investment.
Analyze risks and responses, and estimate the importance of performing security audits versus not
implementing them.
Invite relevant parties to participate in the discussion, give opinions or feedback on the proposal.
Be willing to answer additional questions or provide additional information to build trust and
support from stakeholders.
28
REFERENCES
adserosecurity, n.d. SECURITY RISK ASSESSMENT. [Online]
29
Available at: https://www.techtarget.com/searchsecurity/definition/security-policy
30