Overview Once security requirements have been defined, an organization must have

Do you need this or any other assignment done for you from scratch?
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Overview
Once security requirements have been defined, an organization must have a way to ensure that these requirements are satisfied. Security controls are safeguards or countermeasures that organizations implement to protect all types of assets (data, physical, personnel, and so on) from threats to confidentiality, integrity, or availability. Trade groups such as the Center for Internet Security (CIS), the International Organization for Standardization (ISO), and the National Institute of Standards and Technology (NIST) provide collections of security controls intended to address critical areas of cybersecurity concern. However, these guidelines provide different levels of detail, vary in prescriiptiveness, and apply to different industries and organizational structures. Ultimately, each organization must determine how to best implement security controls to meet their expectations for asset protection. As such, the security practitioner must select, design, implement, and manage the policies, procedures, standards, and guidelines designed to implement these controls.
In the milestone assignment for this project, you examined employee training as a control measure to reduce the incidents and effects of social engineering. As you saw, training is a key method for incorporating security best practices. However, it is not the only type of control measure that cybersecurity professionals rely on. Incorporate instructor feedback you received on the milestone as you envision a more comprehensive approach to security controls at an organization.
In this project, you will analyze requirements, select appropriate security controls, and specify methods to implement your selected controls to satisfy the requirements. You will demonstrate your mastery of the following course competency:
Design security controls and practices for humans in the system
Scenario
Use the Project Three Scenario to complete this assignment. This scenario places you in the role of a security consultant for an organization. The scenario includes additional requirements related to the proposal you addressed in Projects One and Two.
To complete this project, review the following documents:
Service Level Agreement
CIS Controls, Version 8
To complete this task, you will prepare service level agreement requirement recommendations for the internal stakeholder board identifying an approach to meeting the requirements in the scenario.
Prompt
Prepare a brief that outlines the requirement recommendations for the service level agreement and describes your approach to meeting the requirements of the scenario. You must address the following critical elements:
Select two controls that address the requirements of the scenario.
Control One: Justify how your selected control type (i.e., policy, standard, procedure, or guideline) and implementation will meet the requirements.
Control Two: Justify how your selected control type (i.e., policy, standard, procedure, or guideline) and implementation will meet the requirements.
Describe the necessity for a training program to address a specific social engineering threat.
Describe the expected outcomes of a training program that addresses the social engineering threat you identified in the previous critical element.
What to Submit
Your submission should be 1 to 3 pages in length and use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA style

Do you need this or any other assignment done for you from scratch?
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!