Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Overall Project Scenario Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia. The compan

Overall Project Scenario Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia. The compan

Overall Project Scenario

Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia.

The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection.

Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company’s information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information

Project Part 2: Access Controls Procedure Guide

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§  Understand and document the purpose of each access control change request

§  Know what access controls were in place before any changes

§  Get an approval of change by management

§  Understand the scope of the change, both with respect to users, computers, and objects

§  Have evaluated the expected impact of the change

§  Know how to evaluate whether the change meets the goals

§  Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§  Status or setting prior to any change

§  Reason for the change

§  Change to implement

§  Scope of the change

§  Impact of the change

§  Status or setting after the change

§  Process to evaluate the change

Submission Requirements APA format

2 references

Show more
  • @
  • 90 orders completed
ANSWER

Tutor has posted answer for $13.00. See answer's preview

$13.00

***** am **** ******* on *** ******** You can have * **** ** ** If *** may **** ******* ********** ****** feel **** ** ******* **

Click here to download attached files: Security Evaluation.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question