Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Vulnerability management is a key ongoing effort that should be part of all cybersecurity programs. Identifying the configuration of assets and patches required is an

Vulnerability management is a key ongoing effort that should be part of all cybersecurity programs. Identifying the configuration of assets and patches required is an important hardening activity. The Environment: The Environment:The organization all class members will create their program document for is a BANK.This bank has three branches in the Springfield, IL area. It has an online component where customers can log in to an online site to do banking business. There is also a mobile app that does the same functions. They have small physical data center in each bank, as well as a larger one off-site, that centralizes some functions.They also have some infrastructure in their cloud environment, which generally serve the online and app functionality. The main banking application is an internally developed solution called MYBANK and it contains most of the banking functionality. This runs in all branches, as well as in the cloud. Each branch and cloud has a database connected to MYBANK, which all sync in real time. Even though MYBANK is a modern application, the legacy system is still in place, and is running in the main data center (LEGACY BANK).Data from LEGACY BANK is used in the MYBANK application, so a connection is always on. There are a number of other applications that are "bank only" applications (hosted in data center, not on cloud) the provide various services, such as set up loans for various situations (real estate, commercial, personal, auto, etc. - these are all different apps), auditing, and cash counting.The bank has about 200 employees working in all branches, one branch is bigger and has all of the back office type functions (HR, Payroll, etc.). They use an cloud-based ERP solution (BANK OFFICE) to run their back office applications. From a security standpoint, they wish to align to the NIST 800-53r5 standard as well as CIS 8 for detailed technical controls. They are generally a Microsoft shop, and use the related MS tools for cybersecurity.While the above will be standard across all student program documents, that is where the similarity ends. Anything else that is added to this going forward comes from your own ideas, how you would want a bank to work, what technology it may additionally have, etc. The Question: A vulnerability management program can be wide and detailed, requiring tools and process in order to be successful. What are three activities required of a vulnerability management process that are critical for success? Don't consider exact tools or technology at this point, the goal is to flesh out the overall key process steps. Describe them and give some details on those activities based on best practices.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Modeling And Design

Authors: Toby J. Teorey, Sam S. Lightstone, Tom Nadeau, H.V. Jagadish

5th Edition

0123820200, 978-0123820204

More Books

Students also viewed these Databases questions