IAP301 SE161501 Lab4
IAP301 SE161501 Lab4
IAP301 SE161501 Lab4
•Regional ABC Credit union/bank with multiple branches and locations throughout the
region
•Online banking and the use of the Internet is a strength of your bank given limited
human resources
•The customer service department is the most critical business function/operation of
the organization.
•The organization wants to be in compliance with GLBA and IT security best practices
regarding employees.
•The organization wants to monitor and control use of the Internet by implementing
content filtering.
•The organization wants to eliminate personal use of organization owned IT assets and
systems.
•The organization wants to monitor and control the use of the e-mail system by
implementing e-mail security controls.
•The organization wants to implement this policy for all IT assets owned by the
organization and to incorporate this policy review into the annual security awareness
training.
•The organization wants to define a policy framework including a Security Management
Policy defining the separation of duties for information systems security.
Instructions
Using Microsoft Word, craft a Security Management Policy with Defined Separation of Duties
using the following policy template:
ABC Credit Union
Separate of Duties
Policy Statement
Employees who use resources owned by ABC Credit Union are required to follow all applicable
corporate policies when using these resources.
Purpose/Objectives
The purpose of this policy is to ensure that no individual should be able to execute a high-risk
transaction or conceal errors or fraud in the normal course of the duties. This policy must be in
compliance with GLBA.
Scope
This policy applies to all employees, systems and customers of ABC Credit Union.
Standards
Each employee will be divided into groups or departments, with each department being given a
set of duties to complete.
Procedures
Group Policies will be put in place to guarantee that workers can only access the files they
actually require.
Every year, departments will receive training to go over any potential changes to their duties
and policies.
Each department will develop a chain of command that ascends to executive management.
Users who have been given the responsibility of managing IT systems are accountable for
making sure those systems are always adequately protected against known threats and
vulnerabilities to the extent that this is both practicable and compatible with the designated
purpose of those systems.
Guidelines
Users will be trained to follow all policies and procedures in the organization. System
Administrators can refer to NIST Special Publication 800-53 Security and Privacy Controls
==============================================================================
Overview
In this lab, you examined the seven domains of a typical IT infrastructure from an information
systems security responsibility perspective. What are the roles and responsibilities performed
by the IT professional, and what are the roles and responsibilities of the information systems
security practitioner? This lab presented an overview of exactly what those roles and
responsibilities are and, more importantly, how to define a security management policy that
aligns and defines who is responsible for what. This is critical during a security incident that
requires immediate attention by the security incident response team.
Lab Assessment Questions & Answers
1. For each of the seven domains of a typical IT infrastructure, summarize what the
information systems security responsibilities are within that domain:
User Domain is the weakest link in an IT infrastructure. Anyone in charge of computer security
must be aware of the motives behind any penetration of a system, applications, or data.
Workstation Domain can be a desktop computer, a laptop computer, a special-purpose
terminal, or any other device that connects to your network. The Workstation Domain controls
must be protected by the IT security team. Human resources departments typically base the
appropriate access control for employees on their jobs. Based on this criteria, IT security staff
then award access permissions to systems, applications, and data.
The LAN support group is in charge of the LAN Domain. Both the cognitive and physical
components are included in this. Access controls must be set up for users and maintained and
supported by LAN system administrators for departments' file and print services.
The network security group is responsible for the LAN-to-WAN Domain. Both the cognitive and
physical components are included in this. Members of the group are in charge of implementing
the specified security controls.