Altamaha Tech Incorporated
Altamaha Tech Incorporated is a company that specializes in the development of wearable medical devices. The company has recently experienced a high turnover of design engineers and scientists. Understanding the current situation, the company held a meeting on what steps can be taken to improve operations and secure its information and information systems. The company's initial concern would focus on the possibility of internal and external threats due to the high turnover of key employees. To aid the company in developing security controls that address known issues, the company has completed a security audit by a trusted third party. The independent security report has detailed information on all issues found within the security program.
You will assume the role of the CTO (Chief Technology Officer) to review the attached security reportLinks to an external site. (PDF) to develop proposed security improvements. You must determine the appropriate actions based on industry standards and best practices to create a plan to resolve security issues.
Describe assessment techniques used to determine threats and vulnerabilities.
Describe physical security threats and vulnerabilities.
Describe logical (technical) security threats and vulnerabilities.
Summarize required policies to protect information systems:
Acceptable Use Policy (AUP)
Mobiles Device Management (MDM)
Personally identifiable information (PII)
Payment Card Industry Data Security Standard (PCI DSS)
Information system secure backup strategies
Describe policies and procedures used for continuous security monitoring.
Describe training and continuing education policies implementation.
Altamaha Tech Incorporated Security Improvement Plan
CTO Review of Security Report
I have reviewed the security report provided by the trusted third party, and I have identified the following areas where Altamaha Tech Incorporated can improve its security posture:
- Assessment techniques used to determine threats and vulnerabilities:
- Physical security threats and vulnerabilities:
- Logical (technical) security threats and vulnerabilities:
- Acceptable Use Policy (AUP): An AUP defines the acceptable uses of Altamaha Tech Incorporated's information and information systems.
- Mobiles Device Management (MDM): An MDM solution can be used to manage and secure mobile devices that are used to access Altamaha Tech Incorporated's information and information systems.
- Personally identifiable information (PII): Altamaha Tech Incorporated should have a policy in place to protect PII, which is data that can be used to identify an individual.
- Payment Card Industry Data Security Standard (PCI DSS): Altamaha Tech Incorporated should comply with PCI DSS if it processes, stores, or transmits credit card data.
- Information system secure backup strategies: Altamaha Tech Incorporated should have a secure backup strategy in place to protect its information and information systems in the event of a disaster or other incident.
- Log monitoring: Altamaha Tech Incorporated should monitor its logs for suspicious activity.
- Security information and event management (SIEM): A SIEM solution can be used to collect and analyze security logs from multiple sources to identify potential threats.
- Network monitoring: Altamaha Tech Incorporated should monitor its network for suspicious activity.
- Vulnerability scanning: Altamaha Tech Incorporated should regularly scan its systems for vulnerabilities.
- Security awareness training: All Altamaha Tech Incorporated employees should receive security awareness training.
- Role-based training: Employees should receive training on the security policies and procedures that are relevant to their roles.
- Continuing education: Altamaha Tech Incorporated employees should receive continuing education on security topics.
- Implement a vulnerability management program: Altamaha Tech Incorporated should implement a vulnerability management program to identify, assess, and prioritize vulnerabilities. The program should also include a process for remediating vulnerabilities on a timely basis.
- Implement a security awareness program: Altamaha Tech Incorporated should implement a security awareness program to educate employees about security best practices. The program should also teach employees how to identify and report suspicious activity.
- Implement a mobile device management (MDM) solution: Altamaha Tech Incorporated should implement an MDM solution to manage and secure mobile devices that are used to access its information and information systems.
- Implement a PCI DSS compliance program: Altamaha Tech Incorporated should implement a PCI DSS compliance program if it processes, stores, or transmits credit card data.
- Implement a continuous security monitoring program: Altamaha Tech Incorporated should implement a continuous security monitoring program to monitor its logs, network, and systems for suspicious activity.