13 Nov You have been hired as a security analyst at a midsize financial organization, FinSecure Corp
You have been hired as a security analyst at a midsize financial organization, FinSecure Corp. The company is undergoing a security review and has asked you to assess its current access management practices, operational security processes, and system threat activity. You have been provided with a user role matrix, access control policies, operational policy excerpts, and system logs from the past 48 hours. Your goal is to review the provided materials, identify potential issues, and recommend improvements aligned with industry best practices.
Refer to the attached “Security Operations Artifact” in the Supporting Documents section.
Requirements
A. Apply an access control model to the provided user role matrix and access control policies in the attached “Security Operations Artifact” by doing the following:
1. Choose an access control model to apply to the provided user role matrix, and explain how the principles of your chosen model apply to the organization’s access control structure.
2. Identify four misalignments in the provided user role matrix based on your chosen access control model, and explain how each misalignment conflicts with your model’s principles.
3. Recommend three changes to resolve the misalignments identified in part A2. Justify each recommendation based on applicable industry standards, frameworks, or best practices (e.g., NIST SP 800-53, ISO/IEC 27001, CIS Controls, principles from the SSCP Common Body of Knowledge).
4. Revise the provided user role matrix to reflect your chosen access control type and to incorporate the changes recommended in part A3.
B. Evaluate the organization’s access control policies and related operational practices by doing the following:
1. Identify three policy gaps or inconsistencies in the organization’s access control policies that could affect access management or operational security.
2. Recommend one policy change or update for each gap identified in part B1 to strengthen policy alignment with security best practices.
C. Using the attached “Security Operations Artifact,” evaluate the organization’s broader operational processes and practices (e.g., change management, security awareness, asset handling, physical security operations). Include the following elements in your evaluation:
• an identification of three weaknesses in operational practices
• an explanation of how each identified weakness affects the confidentiality, integrity, or availability (CIA) of organizational information
• a recommendation of one improvement to address each identified weakness
D. Analyze the system logs provided in the attached “Security Operations Artifact” to identify potential security threats by doing the following:
1. Identify three threats within the system logs, and classify each threat by type (e.g., insider, malware, brute force, misconfiguration).
2. Propose one mitigation strategy for each identified threat, and justify each strategy by referencing a recognized operational risk analysis model (e.g., NIST RMF, OCTAVE, ISO 27005) or accepted security best practices (e.g., CIS Controls, least privilege).
E. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
F. Demonstrate professional communication in the content and presentation of your submission.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.