See attached. Lab3: Defining a Security Policy Framework In this lab, you will research security policy frameworks. Next, you

See attached.

Lab3: Defining a Security Policy Framework

In this lab, you will research security policy frameworks. Next, you will determine the appropriate security policy definitions to mitigate specific risks, threats, or vulnerabilities. You will organize your results into a framework that can become part of a layered security strategy. This is a Theory Lab and does not require the use of a virtual environment.

Part 1: Research Security Policy Frameworks

· Summarize the Policy Development Guide’s recommendations for organizing a policy hierarchy and selecting policy topics.

· Describe the core principles and objectives of COBIT 2019.

Part 2: Define a Security Policy Framework

For each risk, threat, or vulnerability in the list above, select an appropriate security policy that might help mitigate it. You can select one of the SANS policies or choose one from the following list.

Organize the security policies you selected so that they can be used as part of an overall framework for a layered security strategy.

When you have completed the lab, click the “Download Lab Report as PDF” icon

TEXTBOOK

Johnson, R., & Easttom, C. (2022). Security policies and implementation issues (3rd ed.). Jones & Bartlett Learning.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 a

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 and was enacted to assist reform the financial industry and address consumer financial privacy concerns (Federal Trade Commission, 2023). GLBA possesses requirements for the Federal Trade Commission and

Find videos showing a real-world health system. Then, conduct research for each following items: Provide the title of the video, and the Web link. Then,

Find videos showing a real-world health system. Then, conduct research for each following items: Provide the title of the video, and the Web link. Then, summarize it–including details, features, functions, contents, etc.), stakeholders, markets, and elaborate business value(s) it delivers and/or enables. Imagine you are the owner or the system analyst

300 words due 6/5/5024 2 references Discussion 2-1: Aligning an IT Security Assessment

300 words due 6/5/5024 2 references Discussion 2-1: Aligning an IT Security Assessment How does the Gramm-Leach-Bliley Act (GLBA) impact information systems security and the need for information systems security practitioners and professionals? If an organization is a financial institution or insurance company that is also publicly traded, what other