Independent Software Incorporated (ISI) is a small software development company with eight employees who work at the home office. Their primary accounts are associated with major market retailers, the federal government, and large state governments. The computer environment for ISI contains a Linux file and print server, a Linux Web server, and ten heterogeneous workstations running multiple operating systems. ISI’s coding development projects often encompass classified information and personally identifiable information (PII).
Based on the scenario above, write a unique paper where you:
Explain why ISI needs an access control plan and the goals of the plan, citing specific, credible sources that support your assertions and conclusions.
Develop at least three layered access security strategies that can be used to protect ISI’s data at rest, data in motion, and file systems; citing specific, credible sources that support your proposed strategies.
Explain a best practice process and procedures for implementing ISI’s access security strategies and the overall framework in which they will reside, citing specific, credible sources that support your assertions and conclusions.
Describe the verification process that can be used to ensure that ISI’s access control plan is effective, citing specific, credible sources that support your assertions and conclusions.
Explain how ISI’s verification process will be maintained and updated in response to future changes in access requirements.
Why ISI Needs an Access Control Plan
Independent Software Incorporated (ISI) requires a robust access control plan to protect sensitive data due to several factors:
Goals of the Access Control Plan
ISI’s access control plan should strive to achieve the following goals:
Layered Access Security Strategies
To achieve its access control goals, ISI can implement a layered security strategy encompassing data at rest, data in motion, and file systems:
Data at Rest:
Data in Motion:
File Systems:
Implementing and Maintaining the Access Control Plan
Best Practices: