Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Activity 2 : On - Site Identity Issues Scenario In this activity, you will be provided with two different local identity scenarios. For each, you

Activity 2: On-Site Identity Issues Scenario
In this activity, you will be provided with two different local identity scenarios. For each, you should
research the technology or situation described, and then write a written recommendation to handle
the issue described. In Part 3, you will review your answers and look for potential flaws that remain.
Part 1: Emergency privilege escalation
3
At Example Corp., administrative accounts are created and managed using a central identity and
access management suite. This suite, as well as the company's central AAA servers, are hosted in
redundant datacentres, and site-to-site VPNs normally connect those datacentres to multiple
locations around the country.
Example Corp.'s systems engineering department recently dealt with a major internet connectivity
outage, which also resulted in engineers being unable to log in to the systems at the sites where they
worked. This meant that they were unable to work to fix the issues.
The engineers have requested that you identify a secure way to provide emergency, on-demand
privileged access to local servers when the central AAA services are unavailable. You have been asked
to provide a solution to central IT management that is both secure and flexible enough to allow
authentication for network devices, servers, and workstations.
Part 2: Managing privilege creep
A recent audit of Example Corp.'s file shares shows that many long-term employees have significantly
broader rights to files and folders than their current roles should allow. In fact, in some cases
employees could see sensitive data that could result in negative audit findings in a pending external
audit.
How would you recommend that Example Corp. handle both the current issue of privilege creep and
the ongoing problem of ensuring that it does not occur in the future without seriously disrupting the
company's operations?
Part 3: Review
Review your recommendations to ensure that confidentiality, integrity, and availability are maintained. Did you provide a solution that covers each of these three areas?
Does your solution cover each of these areas (if appropriate)?
Personnel
Endpoint devices
Servers
Services and applications
Roles and groups
If you were asked to conduct a penetration test of an organization that had implemented your
recommendations, how would you approach attacking your solution?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Essentials of Database Management

Authors: Jeffrey A. Hoffer, Heikki Topi, Ramesh Venkataraman

1st edition

133405680, 9780133547702 , 978-0133405682

More Books

Students also viewed these Databases questions

Question

Prepare a short profile of Henry words worth Longfellow?

Answered: 1 week ago

Question

What is RAM as far as telecommunication is concerned?

Answered: 1 week ago

Question

Question 1: What is reproductive system? Question 2: What is Semen?

Answered: 1 week ago

Question

Describe the sources of long term financing.

Answered: 1 week ago