Question
Please identify at least one security architecture, configuration, and/or policy vulnerabilities in the organization scenario presented below. Your discussion should be professionally and clearly stated
Please identify at least one security architecture, configuration, and/or policy vulnerabilities in the organization scenario presented below. Your discussion should be professionally and clearly stated as if you were explaining the issue to mid- or senior-level management. In your discussion you should identify the issue and suggest potential mitigations and/or policy changes to reduce the risk to the organization. Explain your answer in about 2 paragraphs.
Scenario:
You have recently been hired by a medium-sized organization to assist them in revising their information security policies and practices. In your initial review of the organization's IT assets you document that their employees work on Windows-based client machines. These Windows clients are managed by a Windows Server running an Active Directory Domain Controller, providing authentication, configuration management, logging, and patch management for all the connected clients. Users have the local admin privileges on their clients in order to be able to install and maintain the software each department needs to perform their business functions.
The organization operates an internal intranet web server and file server hosted on a Linux server. This web server contains multiple websites, serving the employee's needs for internal hosting of documents, wiki's, customer records, accounting documents and records, HR documents, and leadership strategy planning documents and activities. Employees are able to SSH into the web server to update web pages for their departments, add or remove files, and add new webpages as needed. The web server and MySQL database run with the context of root. The Samba file sharing server runs with the context of Samba with each user who accesses the file share authenticating to the service with their Windows credentials which the Samba service then verifies with the Windows Domain Controller. The server logs the Apache web access and error activity locally to /var/log/apache and the IT department pulls the logs once per week for review.
The marketing and sales department employees travel frequently and are issued laptops so they can carry marketing presentations and generate sales estimates and reports. Since they work untethered from the organization Intranet they tend to copy a lot of files off the Intranet server before they travel so they have a local copy of things they may need. When they return from their business trip they either email themselves files they want to load back onto the Intranet or they use USB thumb drives to copy files from the laptop onto their desktop systems at the office.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started