Cybersecurity

Words: 24
Pages: 1
Subject: Uncategorized

Paper requirements:
The paper should be 3000 (+/- 100) words.
As you analyze your research results, take positions and defend them with specific examples from publications (references!)
REMEMBER: There is NO right or wrong answer.
The paper should contain an executive summary of about 200 words and a conclusion of about 100 words.
Paper weight: 20% Executive Summary and Introduction, 60% body of the paper, 20% Conclusion.
The paper should be formatted using the MLA (modern language association) style. Please refer to the following source for help using the MLA format: click here (link will open in new window)
Paper topic:
A government agency has hired you, “the information security consultant,” to perform an initial assessment (as a part of the due diligence) on a new initiative they are required to take on. This initiative will involve a strategic partnership with a Managed Security Services Provider (MSSP). The government agency will be outsourcing their security operations center (SOC) to the MSSP.
The outsourced SOC will be responsible to manage all security incidents pertaining to the government agency and will be the first point of contact for all such incidents. The SOC also will also perform Identity and Access provisioning for the agency’s employees and as such will need privileged access to the agency’s critical access and data.
As a part of the due diligence, the senior management is interested to know the following as it pertains to asset and access management:
Discuss the identity and access management issues that might arise due to the nature of the above engagement.
Discuss the role that asset and data classification will play in determining what information will the MSSP be allowed to access and how that determination is made.
Discuss how you will ensure that the MSSP complies with the best practices around identity and access provisioning lifecycle.
How will a determination be made as to what authorization mechanisms will be used for the MSSP users that access the agency’s assets/data? (RBAC, Rule-based, MAC, DAC).
What considerations need to be discussed to prevent or mitigate access control attacks?

Let Us write for you! We offer custom paper writing services Order Now.

REVIEWS


Criminology Order #: 564575

“ This is exactly what I needed . Thank you so much.”

Joanna David.


Communications and Media Order #: 564566
"Great job, completed quicker than expected. Thank you very much!"

Peggy Smith.

Art Order #: 563708
Thanks a million to the great team.

Harrison James.


"Very efficient definitely recommend this site for help getting your assignments to help"

Hannah Seven