preview

IS3230 Unit 4 Assignment 1 Chris Wigint

Better Essays

IS3230 Unit 4 Assignment 1
Chris Wiginton
ITT Technical Institute, Tampa FL
Instructor: David Marquez
14 April, 2014

Access Control Plan
INTRODUCTION
This Dragon Net Solutions (DNS) Access Control and Account Management Plan details the access control and account management activities for Dragon Net Solutions. It facilitates compliance with the National Institute of Standards and Technology’s (NIST) Recommended Security Controls for Federal Information Systems (NIST 800-53) and the NIST Guide for Accessing the Security Controls in Federal Information Systems (NIST 800-53A). Specifically, the following NIST Access Controls (AC) are addressed:
AC-1 Access Control Policy and Procedures
AC-2 Account Management
AC-3 Access …show more content…

AUDIT METHODOLOGY
The CTSP/SA will conduct an audit at least once during an incident assignment and annually in a local unit setting. The Auditing function is accessed by user accounts with the DB Admin access right. Auditing allows users to audit the following activities within the DNS application:
DNS Login History – Logins and Logoffs of different databases
External Access History – External User Accounts that have accessed an DNS database in an external application
User Account History – Changes made to User and Admin Accounts
External Account History – Changes made to External User Accounts
The CTSP/SA will also confirm the following:
Least privilege for all user accounts has been verified
Separation of duties for all user accounts has been verified
AUTHORIZED ACCESS CONTROLED
Item Name: Router, Switch 1, Switch 2, Switch 3, Wireless AP1, Wireless AP 2, Wireless PC1, Wireless PC2, Wireless PDA, Network PC 1, Network PC 2, Network PC 3, File Server, Web Server, Intranet.
Description and relevant performance metrics: Digital Computers with 2688 Intel Itanium Processors and 384 MIPS Processors distributed amongst 10 single image NUMA-based clusters. Individual clusters have a compute capability in excess of 190 million MTOPS
Physical:
Only authorized personnel are allowed unescorted access to the Computer Room with proper security credentials.
Prior to a tour, Operations conducts a sweep of the

Get Access