0% found this document useful (0 votes)
56 views6 pages

Midterm Laboratory Exercise 3

Information assurance sample templates

Uploaded by

Daniel Dionisio
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views6 pages

Midterm Laboratory Exercise 3

Information assurance sample templates

Uploaded by

Daniel Dionisio
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Course Code 290030 Section 29106

Course Details Information Quality Assurance 1 Date 10-21-24

Name Dionisio, Denemi Daniel C. Student No. 201911045

Midterm Laboratory Exercise 3


Develop Cybersecurity Policies and Procedures
Introduction

Information security policies provide a framework for organizations to manage and protect their
assets, and a safeguard that the organizations employ to reduce risk. Students will be required to
compare information security policies to determine the differences between policies, standards,
guidelines, and procedures. Students will then develop an information security policy to address existing
vulnerabilities identified by an internal audit.

For example, a password policy states the standard for creating strong passwords and protecting
passwords. A password construction guideline defines how to create a strong password and provides
best practices recommendations. The password procedure provides the instructions on how to
implement the strong password requirement. Organizations do not update policies as frequently as they
update procedures within the information security policy framework.

Objectives

This project includes the following objectives:

Part 1: Review the Scenario

Part 2: Review and Prioritize Audit Findings

Part 3: Develop Policy Documents

Part 4: Develop a Plan to Disseminate and Evaluate Policies

Requirements

You will need internet access to the following websites, video, and documents:

= SANS Security Policy Project


https://www.sans.org/security-resources/policies/

= Information Security Policy (video)


https://youtu.be/ZlKgMUOpMf8

= Top Computer Security Vulnerabilities


https://www.n-able.com/features/computer-security-vulnerabilities

= Information Security Policy – A Development Guide for Large and Small Companies
(pdf) https://www.sans.org/reading-room/whitepapers/policyissues/information-security-policy-
development-guide-large-small-companies-1331
= Technical Writing for IT Security Policies in Five Easy Steps
https://www.sans.org/reading-room/whitepapers/policyissues/technical-writing-security-policies-easy-
steps-492

Scenario

ACME Healthcare is a healthcare company that runs over 25 medical facilities including patient
care, diagnostics, outpatient care, and emergency care. The organization has experienced several data
breaches over the last five years. These data breaches have cost the organization financially and
damaged its reputation.

The executive leadership team recently hired a new chief information security officer (CISO). The
new CISO has brought in one of the top cybersecurity penetration teams to perform a full security audit
on the entire organization. This independent contractor conducted the audit, and found the following
vulnerabilities:

1) Several accounts were identified for employees that are no longer employed by ACME.

2) Several user accounts allowed unauthorized and escalated privileges. These accounts
accessed systems and information without formal authorization.

3) Several devices and systems allowed unsecure remote access.

4) Forty percent of all organization passwords audited were cracked within 6 hours.

5) Password expiration was not standardized.

6) Sensitive files were found unencrypted on user devices.

7) Several wireless hotspots used WEP for encryption and authentication.

8) Evidence indicates that sensitive e-mail was sent to and from employee homes and mobile
devices without encryption.

9) Intrusion detection logs were infrequently reviewed and analyzed.

10) Devices with sensitive company data were used by employees for private use.

11) Employee devices were left unattended and employees failed to logout of the company
network and data systems.

12) Inconsistent device updates and configurations were performed.

13) Several firewall rules were set to permit all traffic unless specifically denied.

14) Company servers were not updated with the latest patches.

15) The intranet web server allowed users to change personal information about themselves,
including contact information.

Instructions

Part 1: Review of the Scenario

Read the scenario given above. Watch the Information Security Policy video. Take notes to help
you differentiate the various levels and types of policies.

Part 2: Review and Prioritize Audit Findings


a. Research the types of vulnerabilities listed to determine which of them pose the greatest
threat. Go to Top Computer Security Vulnerabilities to learn more.

b. Based on your research, list the top five security audit findings that ACME should address,
starting with the greatest vulnerability.

c. Record your rankings in a Vulnerabilities Ranking Table, like the one shown below. It lists
the Vulnerabilities, the Recommended Policy to mitigate this vulnerability, and your Justification for the
ranking you determined.

Vulnerabilities Ranking Table

Vulnerability Recommended Policy Justification

Several user accounts Implement a Role-Based Unauthorized access is a


allowed unauthorized and Access Control (RBAC) policy and critical issue because it can lead
escalated privileges conduct regular access audits to unauthorized data theft,
system changes, or breaches.
Escalated privileges without
oversight can also allow attackers
or disgruntled employees to
cause significant harm.

Devices and systems Adopt a Strict Remote Unsecured remote access


allowed unsecure remote access Access Policy with multi-factor is one of the easiest ways for
authentication and VPN use external attackers to infiltrate the
network, especially with the
increase of remote work.

Sensitive files were Enforce Data Encryption Leaving sensitive data


unencrypted on user devices Policies for all sensitive unencrypted makes it easy for
information attackers or unauthorized users
to access valuable data, especially
in case of device theft.

Inconsistent device Establish a Patch Outdated systems and


updates and configurations were Management Policy with regular software expose the organization
performed updates and maintenance to known vulnerabilities and
exploits, including malware.
Ensuring timely updates is critical
for security.

Several firewall rules Update the Firewall Policy Allowing all traffic
allowed all traffic unless with strict traffic rules and increases the risk of unauthorized
specifically denied ongoing review access to the network, leaving the
organization vulnerable to
various attacks, such as botnets
or malware intrusions.

A sample answer table.


Vulnerabilities Ranking Table

Vulnerability Recommended Policy Justification

Several accounts were When an employee leaves The former employee


identified for employees that are the company: may gain unauthorized access to
no longer employed by ACME. proprietary and confidential
Review all access
information and equipment.
permission
Anyone with the former
Retrieve data from the employee's credentials can gain
employee if appropriate unauthorized access to internal
system.
Terminate access and
reset all passwords

Several user accounts Assign the least privilege The least privilege allows
allowed unauthorized and to perform the task the user to perform all the
escalated privileges and accessed necessary tasks without the risk
Log when elevated
systems and information without of causing systemic changes
privileges are used
formal authorization. unintentionally.

Several devices and Disable unsecured remote Unsecured remote access


systems allowed unsecure remote access, such as Telnet transmits the data in plaintext.
access. The transmission of plaintext can
Require secure remote
expose sensitive information,
access, such as SSH and VPN
such as user credentials, for
malicious actors to conduct
reconnaissance and attacks.

Forty percent of all New password policy: When the passwords are
organization passwords audited cracked, the attacker can gain
Implement 2FA or MFA
were cracked within 6 hours. unauthorized access and change
User passphrases the passwords to lock out the
authorized users.
Change passwords only
after evidence of compromise

No reuse of old
passwords

No reuse of passwords on
different applications

Enable copy/paste
passwords

Educate users on basic


cybersecurity

Several wireless hotspots Upgrade wireless WEP is prone to man-in-


used WEP for encryption and hotspots to the most secure the-middle attacks and the key is
authentication. encryption and authentication easily cracked and hard to
available distribute to the users.
Vulnerabilities Ranking Table

Company servers were Establish a plan to update Updating regularly can


not updated with the latest / test the latest patches at regular protect the data, fix security
patches. intervals. vulnerability, and improve the
stability of the OS and
applications.

Blank Line, No additional information

Part 3: Develop Policy Documents

Step 1: Create an Information Security Policy

a. Choose one vulnerability in the table for which to develop a security policy.

b. Use the Information Security Policy Templates to develop a specific security policy for
ACME Healthcare that addresses your chosen vulnerability.

Note: Follow the template as a guideline. Address all existing policy elements. No policy should
exceed two pages in length.

Step 2: Create a Procedure

a. Create a step-by-step set of instructions that supports your information security policy. Go
to Information Security Policy — A Development Guide and Technical Writing for IT Security Policies in
Five Easy Steps for instructions and guidance.

Note: All the above links will also be useful in Part 4 of this lab. Keep them open and bookmark
them.

b. Include all the information that a user would need to properly configure or complete the
task in accordance with the security policy.

Part 4: Develop a Plan to Disseminate and Evaluate Policies

Step 1: Create an Information Security Policy Implementation and Dissemination Plan.

a. Document the information required to create an information security policy


implementation and dissemination plan.

b. Include specific tasks and events that ACME Healthcare will use to make sure that all
employees involved are aware of the information security policies that pertain to them.

c. Include any specific departments that need to be involved. ACME Healthcare must also be
able to assess whether individuals have the proper knowledge of the policies that pertain to their job
responsibilities.

Conclusion

ACME Healthcare’s Information Security Policy Implementation and Dissemination Plan focuses
on addressing the key vulnerabilities identified during the audit. The plan involves drafting clear policies
for access control, encryption, patch management, and firewall settings, with input from departments
like IT, HR, Compliance, and Legal. Policies will be communicated via email, the intranet, webinars, and
visual reminders. Tailored training programs will be developed to ensure employees understand their
responsibilities, with specific modules for IT staff, general employees, and management. All employees
will acknowledge receipt and understanding of policies, and security drills will test policy effectiveness.
Regular policy reviews, audits, and updates will ensure continued compliance and risk mitigation across
the organization.

ACME Healthcare's Information Security Policy Implementation Plan is designed to address


critical vulnerabilities identified during the audit, involving clear policies, effective communication, and
robust training programs tailored to the roles of its employees. By involving key departments like IT, HR,
and Compliance, the company ensures that security becomes a shared responsibility across the
organization. Regular reviews, employee assessments, and ongoing training will help ACME remain
compliant with legal standards, while protecting both its data and reputation.

This comprehensive approach ensures that employees not only understand their roles in
safeguarding company assets but also follow proper procedures to mitigate risks proactively.

End of document

You might also like