Risk management framework that requires agencies

Assignment Help Computer Engineering
Reference no: EM133483147

Case: FIPS 200 is a federal standard that specifies minimum security requirements for information and information systems supporting executive agencies. It is part of a risk management framework that requires agencies to assess the security risks and categorize the systems using FIPS 199. FIPS 200 also provides a risk-based process for selecting security controls from several categories, such as access control, audit and accountability, certification, accreditation, and security assessments.

One of the control families described in FIPS 200 is Access Control. A security policy addressing this control family would define the rules and requirements for accessing information and information systems. The policy would include the following components:

Purpose: The purpose of the policy is to establish the rules for accessing information and information systems.

Scope: The policy applies to all users of information and information systems, including employees, contractors, and third-party service providers.

Roles and Responsibilities: The policy defines the roles and responsibilities of different stakeholders, such as system owners, system administrators, and users.

Access Control Requirements: The policy specifies the requirements for accessing information and information systems, such as authentication, authorization, and access control mechanisms.

Enforcement: The policy defines the consequences of non-compliance with the access control requirements.

The primary components of the security policy with respect to the security requirements described within the Access Control family would include defining who is authorized to access which resources under what conditions. This would involve specifying authentication methods, authorization processes, and access control mechanisms. Additionally, the policy would outline procedures for granting, revoking, and reviewing access privileges. It would also specify how access control violations are detected, reported, and addressed.

Reference no: EM133483147

Questions Cloud

Describe the security issues of various network hardware : Examine the TCP/IP protocol suite, well-known ports, and the three-way handshake and Describe the security issues of various network hardware components
Do ethics influence the leadership style of the nurse leader : How does one communicate the characteristics of a role model with this provision? Do ethics influence the leadership style of the nurse leader?
Find assisted living facility on the web : Find an assisted living facility on the web and describe the facility, the services, the pluses and the minuses.
Analyze impact the treatment of tuberculosis worldwide : Analyze current healthcare policies that impact the treatment of tuberculosis worldwide.
Risk management framework that requires agencies : Risk management framework that requires agencies to assess the security risks and categorize the systems using FIPS 199
Where is this study on the levels of evidence pyramid : This should be clearly stated. Where is this study on the Levels of Evidence Pyramid? What are the advantages and disadvantages of this research design?
Improve readmission rates : Can you give an example of using technology to improve outcomes of patients that you have used in the past to improve readmission rates?
Describe the steps for data gathering and analysis : Describe the steps for data gathering and analysis. Be specific about the techniques and algorithms relevant to your chosen operational model
Knowledge and ability to deal with accidents : You are required to complete an incident report (actual or simulated) to provide evidence of your skills, knowledge and ability to deal with accidents

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd