ITFP4803 Implementing an Information Systems Security Policy

ITFP4803 Implementing an Information Systems Security Policy
Part 2 – Security Planning: Acceptable Use and Workstation Security Policies Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that you might add that add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning. Acceptable Use (2–3 pages). Workstation Security for a regulated health care environment (1–2 pages). Consider the following scoring guide criteria as you complete your assessment. Provide required screenshots that document lab completion. Write an Acceptable Use policy that is appropriate for the Course Security scenario. Write a Workstation Security policy that is appropriate for the Course Security scenario. Explain how automated policy distribution can assist in the configuration and compliance of systems. Context: Implementing technical policies that align with the information security plans and “paper” policies in organizations is critical to adoption, adherence and compliance with those policies. While the statement of policy and the perception of governance are critical to a security program’s success, it is also necessary to have the technical controls in place that restrict and ensure users comply with the policies of the organization.
Read less
QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER
error: Content is protected !!