Procedures for implementing access control change

Assignment Help Basic Computer Science
Reference no: EM133024071

Access Controls Procedure Guide

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

- Understand and document the purpose of each access control change request

- Know what access controls were in place before any changes

- Get an approval of change by management

- Understand the scope of the change, both with respect to users, computers, and objects

- Have evaluated the expected impact of the change

- Know how to evaluate whether the change meets the goals

- Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

- Status or setting prior to any change

- Reason for the change

- Change to implement

- Scope of the change

- Impact of the change

- Status or setting after the change

- Process to evaluate the change

Reference no: EM133024071

Questions Cloud

Support the development of effective partnerships : 1. What strategies can you employ to support the development of effective partnerships between staff, Aboriginal and Torres Strait Islander people and their com
About current technological trends : The current trend summary is comprised of individual thoughts about current technological trends.
What the elaine share of the income : Elaine is allowed a salary allowance of $15600. If the partnership had net income of $29900 for 2020, what the Elaine's share of the income
Prepare an acquisition-date consolidation worksheet : Access IT Company exchanged $900,000 for 30 percent of the outstanding voting stock of Net Connect. Prepare an acquisition-date consolidation worksheet
Procedures for implementing access control change : Create a guide that security personnel will use that includes procedures for implementing an access control change.
What is the long-run average volatility : Question - Suppose the parameters in a GARCH (1,1) model are a = 0.03, ß = 0.93 and ? = 0.000005. What is the long-run average volatility
Members of board designation : What are the members of a board's designation in a for-profit and not-for profit corporation?
Calculate the profit for both alternatives : Calculate the profit for both alternatives if the price increases to R182 and indicate which alternative the investor should choose
What factors affecting the reliability and validity of data : What factors affecting the reliability and validity of data might you need to analyse?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Draw context-level diagram for courses registration system

ITEC 630 - 9080 Spring 2017 Midterm. Draw a context-level diagram for the Courses Registration system. Please make sure to include reasonable data flows for the diagram

  Suitable for supply chain web applications

Assess why SSL/TLS (Secure Sockets Layer/Transport Layer Security) is not suitable for supply chain web applications.

  Define a header and data format

Purpose: This program will generate a series of random numbers and produces a table containing these values and some statistics about them. The program should define a Header and Data format string to output results as shown in the sample at the bo..

  Balanced score card for proposed it governance

Assume that you are the CIO of VIU and that you are implementing an IT Governance to better reach the goals of the VIU. Explain in details what items would be in your Balanced Score Card for your proposed IT Governance. Justify your answer.

  What are demand management policies

What are demand management policies? what are supply management policies/ Don't forget to discuss the outcome in the economy.

  Write a program that reads a data file of rational numbers

Write a program that reads a data file containing rational numbers, one per line, stores the numbers in an ArrayList, removes any duplicates, and then outputs.

  Security procedures

When a user does not follow security procedures, what are two consequences to the organization you would emphasize? Why?

  Confidentiality-integrity and availability

What the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability.

  Quotes surrounded by quotation marks and cited in-line

Include at least 3 expert supporting quotes surrounded by quotation marks and cited in-line. Provide an annotated reference list at the end.

  Digital evidence cases involving divorces

A law firm has hired you to assist with digital evidence cases involving divorces. The main evidence consists of email, spreadsheets, and documents.

  What is the public interface of the counter class

what is the public interface of the counter class in section instance variables and encapsulation? How does it differ from the implementation of the class?

  What is an elevator pitch and what structure does it follow

What is an informational interview and why would you want to perform informational interviews?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd