Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Security Management
Security management
General Instruction
Assignment
Comprehensive Security Management Plan
The first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of the projects. Next, you will create the shell document for the final project deliverable that will be worked on during each unit. While you proceed through each project phase, content will be added for each section of the document to gradually complete the final project. Appropriate research should be conducted to support the development of the document, and assumptions may be made.
· Use Word
· Title Page
o Course number and name
o Project name
o Your name
o Date
· Table of Contents (TOC)
o Use an auto-generated TOC.
o This must be on a separate page.
o This must be a maximum of 3 levels deep.
o Be sure to update the fields of the TOC before submitting your project.
· Section Headings (Create each heading on a new page with "TBD" as content, except for the sections that are listed under "New Content.")
o Security Business Requirements (Week 2)
o System Design Principles (Week 3)
o The Training Module (Week 4)
o Conclusion
· References
Week 2: Instructions
This second section will be 2–3 pages to assess security business requirements. After a summary of the capability maturity model integration (CMMI), the process area (PA) of the CMMI model that is considered to
Have the highest importance to the project security requirements will be identified and defended. The PA, its goals, the specific practices, and the generic practices will be part of the justification.
Content
The project deliverables are the following:
Week 2: Security Business Requirements
-Description of existing organization and what it already has in place for a security architecture
-Summarize the CMMI.
-Identify and defend the PA of the CMMI model for your chosen organization.
-The PA, its goals, the specific practices, and the generic practices will be part of the justification.
Week 3: Instructions
You will complete the Key Assignment First Draft. A section to the Comprehensive Security Management Plan will be added to review at least 5 security design principles and their references. The relevance of these principles will be related to the security project.
Content
The project deliverables are the following:
Week 3: System Design Principles
-Relate security design principles to their proposed system changes
-List at least 5 security design principles and their references.
-Specific principles should be related to the overall project
-Make sure that the principles are summarized, referenced, and applied to a security issue for the project.
Week 4: Instructions
A summary of 3–5 pages for the Security Training module section of the Comprehensive Security Management Plan will be included as the final section.
The final step in developing the Comprehensive Security Management Plan is to define a training module. Begin by defining all roles (management, developers, administrators, clerical, etc.) that have security training and awareness needs. Then, suggest a list of courses and workshops. With the list of roles and list of courses and workshops, create a cross-reference in the form of a matrix that includes all the training needs. In 3–5 pages for the training module, include the list of roles, courses with detailed information, and the training matrix.
Content
The project deliverables are the following:
Week 4: The Training Module
-Continue development of the Comprehensive Security Management Plan with a training module for explaining the roles and security training and behavioral needs for each.
-Define a training module.
-Include a list of roles (developers, administrators, clerical, etc.).
-Include a list of courses and workshops.
-Include a cross-reference matrix of training.
6. Conclusion