Discuss the identity and access management issues

Assignment Help Computer Engineering
Reference no: EM133374604

Topic: A government agency has hired you, "the information security consultant," to perform an initial assessment (as a part of the due diligence) on a new initiative they are required to take on. This initiative will involve a strategic partnership with a Managed Security Services Provider (MSSP). The government agency will be outsourcing their security operations center (SOC) to the MSSP.

The outsourced SOC will be responsible to manage all security incidents pertaining to the government agency and will be the first point of contact for all such incidents. The SOC will also perform Identity and Access provisioning for the agency's employees and as such will need privileged access to the agency's critical access and data.

Questions: As a part of the due diligence, the senior management is interested to know the following as it pertains to asset and access management:

  • Discuss the identity and access management issues that might arise due to the nature of the above engagement.
  • Discuss the role that asset and data classification will play in determining what information will the MSSP be allowed to access and how that determination is made.
  • Discuss how you will ensure that the MSSP complies with the best practices around identity and access provisioning lifecycle.
  • How will a determination be made as to what authorization mechanisms will be used for the MSSP users that access the agency's assets/data? (RBAC, Rule-based, MAC, DAC).
  • What considerations need to be discussed to prevent or mitigate access control attacks?

 

Reference no: EM133374604

Questions Cloud

Promotion of peace and preferential option : promotion of peace and preferential option for poor and empathy and compassion for poor people living with disability
Why might physician order one type of imaging vs. another : Why might a physician order one type of imaging vs. another? What details does a coder need to know to determine the correct code?
Explain whether this argument is invalid : Explain whether this argument is invalid using the rules from Conditional Argument Patterns - Is this argument sound
Develop an executable plan that uses all three areas : Develop an executable plan that uses all three areas of the Triad of Destruction to continue to undermine American/other nation-states citizen's trust in
Discuss the identity and access management issues : Discuss the identity and access management issues that might arise due to the nature of the above engagement. Discuss the role that asset and data class
What does it mean to exercise outsight : What does it mean to "exercise outsight"? Why is it important? Give examples of the ways in which outsight can help leaders challenge the process successfully.
What brand or model is it and how does it work : Maybe the mouse? The printer? The monitor (if you have one)? The camera (built-in or attached)? The CD-tray (if your PC still has one)? A USB-attached device
Different sources of stress or fatigue in workplace : Identify below two different sources of stress or fatigue in the workplace.
Creation of the visualization : Brief rationale explaining how the data were organized and used in the creation of the visualization and why you chose the specific visual element.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd