Katie Coleman_CY511_DoD Project Checkpoint 2
.docx
keyboard_arrow_up
School
University of West Alabama *
*We aren’t endorsed by this school
Course
511
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by ProfessorSalmon327
Project: Department of Defense (DoD) Ready
Katie Coleman University of West Alabama
CY-511 – Cybersecurity Organization Policy/Management
Dr. Perez
The Department of Defense or the DoD has strict policies, standards, and control to guarantee the security of its information systems. To ensure the company stays in compliance with the DoD requirements, the company must implement policies, standards, and controls in the
User, Workstation, LAN, and LAN-to-WAN Domains. It will include strong user authorization, authentication, workstation security configuration, LAN security settings, and encrypted LAN-
to-WAN connections. The User Domain includes all persons who have access to the project’s resources. To ensure compliance with the DoD requirements, all users will be identified and authenticated by using strong passwords, biometrics, or smart cards. Users will only be granted access to necessary information, data, resources, and applications needed to perform their duties, which based on the principle of the least privilege. The Workstation Domain includes all the computers used by the project personnel. All workstations will be configured with the appropriate security settings to ensure compliance with the DoD requirements. This will include firewalls, antivirus software, and intrusion detection systems. All software that is installed on the workstations will be authorized and regularly patched to tackle known vulnerabilities. The LAN domain includes all local area networks used by the project personnel. LANs will be configured with the appropriate security settings. This will include firewalls, intrusion detection systems, and access control lists. All network traffic must be encrypted to protect against eavesdropping. This will ensure the company is following DoD requirements. LAN-to-WAN domain includes all connections between the LAN and the wide area network or the WAN. All connection will be encrypted using secure protocols to make sure the
company will stay in compliance with the DoD regulations. This will include IPsec or SSL. All traffic will be monitored and filtered to prevent unauthorized access into the network. A bullet list of DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System/Application Domains are listed below:
WAN Domain:
DoD Directive 8500:01: Cybersecurity
DoD Instruction 8500:02: Information Assurance (IA) Implementation
DoD 8510:01: Risk Management Framework (RMF) for DoD Information Technology
National Institute of Standards and Technology (NIST) Special Publication 800-53: Security and Privacy Controls for Federal Information Systems and Organizations
NIST SP 800-37: Guide for Applying the Risk Management Framework to Federal Information Systems
NIST SP 800-46: Guide to Enterprise Teleworker Services
Federal Information Processing Standards (FIPS) 140-2: Security Requirements for Cryptographic Modules
DoD Instruction 8140:01 Cybersecurity Workforce Management
Remote Access Domain:
DoD Directive 8100:04 Remote Access to DoD Information Systems
DoD Instruction 8100:08: Use of Commercial Cloud Services
NIST SP 800-146: Cloud Computing Synopsis and Recommendations
NIST SP 800-178: Guide to Secure Cloud Computing
NIST SP 800-187: Authenticator Assurance Level (AAL) Requirements for Remote Authentication
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help