Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
Imagine this scenario: Hollywood Organic Co-op has successfully implemented the enterprise EDMS that covers the 5 store locations. They have scheduled an audit of its information security objectives f
Imagine this scenario:
Hollywood Organic Co-op has successfully implemented the enterprise EDMS that covers the 5 store locations. They have scheduled an audit of its information security objectives for the enterprise to determine if security controls are implemented appropriately.
As Hollywood Organic Co-op's IT manager, the CIO, CISO, and CEO have tasked you with developing an audit planning summary that outlines the areas to be audited and the criteria required to provide to the auditor for compliance review. The auditors will be reviewing specific focus areas to ensure all organizational systems, including EDMS, and data are protected per regulatory requirements.
Create a 3- to 4-page audit planning document that includes the following audit focus areas:
Focus Area 1: Password management to ensure passwords are configured and managed properly
Focus Area 2: Access logs to detect if unauthorized individuals have accessed Hollywood Organic Co-op data
Focus Area 3: Incident response to recover from an EDMS system outage
Focus Area 4: Internet points of presence (PoP) to ensure that Hollywood Organic Co-op’s public web presence is protected
Focus Area 5: Transmission controls to ensure that sensitive data is protected while in transit between the customer and system
Focus Area 6: Storage controls to ensure that sensitive data is protected while stored within Hollywood Organic Co-op’s environment
For each focus area, provide the following audit criteria in your audit planning document and justify how each would measure the effectiveness of the implemented security controls:
Criteria 1: Provide 1 interview question for each focus area that includes the responsible party to be interviewed and why.
Criteria 2: Provide at least 2 pieces of example documentation.
Criteria 3: Provide at least 1 security tool or test example that would prove the implementation of the security control.
Construct this assignment as a table or checklist.
Cite references to support your assignment.
Format your citations according to APA guidelines.
- @
- 1767 orders completed
- ANSWER
-
Tutor has posted answer for $20.00. See answer's preview
****************************************************************************************************************************************************************