Question
Using the NIST Cybersecurity Framework, you will apply the Identify function to create an Asset Management Program to provide a complete picture of what, where,
Using the NIST Cybersecurity Framework, you will apply the Identify function to create an Asset Management Program to provide a complete picture of what, where, and how an organization's asset is being used. The goal is to provide documentation for the security analysts to assist them in asset utilization and security. The network diagram created in Week 1 should be used as a basis for the following sections: For each asset shown in the network diagram, write 1-2 paragraphs describing what the asset is, where the asset is used, and how. Create a table (see Table 2.2, Examples of Asset Classifications in the textbook reading) with the columns (Categories, Aspects, and Assets). Determine a significance level (high, medium, low) for each organization asset based on confidentiality, integrity, and availability and add the asset to the respective grouping in the table. Classify each information asset by category (Tier 0, Tier 1, Tier 2, and Significant Systems) and place the asset in the respective grouping based on the level of sensitivity for the associated data to denote the impact of the loss of that asset, related data, or functionality would have. Create a second table that shows the following information for each asset: Owner of asset, role, and responsibility Data policy (Yes/No) and information asset security management policy (Yes/No) Data governance (Yes/No) - (data is protected under the statute, contract, or compliance/regulatory bodies) Create a third table that shows the following information: Inventory of software applications Current list of known vulnerabilities Prioritization of each vulnerability by risk level Application patch level (from software vendor if known) Actions to patch or apply alternative controls Write 4-5 detailed paragraphs that summarize your observations with recommendations. Justifications for each recommendation should be supported by the NIST CSF and other industry-accepted standards.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started