Part 2 – Security Planning: Acceptable Use and Workstation Security Policies Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that you might add that add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning. Acceptable Use (2–3 pages). Workstation Security for a regulated health care environment (1–2 pages). Consider the following scoring guide criteria as you complete your assessment. Provide required screenshots that document lab completion. Write an Acceptable Use policy that is appropriate for the Course Security scenario. Write a Workstation Security policy that is appropriate for the Course Security scenario. Explain how automated policy distribution can assist in the configuration and compliance of systems. Context: Implementing technical policies that align with the information security plans and “paper” policies in organizations is critical to adoption, adherence and compliance with those policies. While the statement of policy and the perception of governance are critical to a security program’s success, it is also necessary to have the technical controls in place that restrict and ensure users comply with the policies of the organization.
Read less
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS

Recent Comments