cyb 260 project three scenario one an initial agreement has been made
Search for question
Question
CYB 260 Project Three Scenario One
An initial agreement has been made, and Helios Health Insurance has provided a service level
agreement (SLA) that defines the relationship between Fitvantage and Helios. You have been
tasked with recommending the implementation of the controls detailed in the SLA.
Now that the partnership is in place, the insurance company's SLA contains the terms and
conditions that require evidence of how Fit-vantage will address three critical
controls-specifically, how the organization will use awareness training to defend against social
engineering attacks.
The SLA covers several of the CIS Controls. Provide the steps needed to ensure that the
following critical controls have been implemented:
Control 4: Controlled Use of Administrative Privileges
Control 14: Controlled Access Based on the Need To Know
Control 17, Section 6: Train Workforce on Identifying Social Engineering Attacks
To complete this project, review the following documents, which have been provided by your
instructor:
Service Level Agreement
CIS Controls, Version 7
Overview
Once security requirements have been defined, an organization must have a way to ensure
these requirements are satisfied. Security controls are safeguards or countermeasures
implemented by organizations to protect all types of assets (data, physical, personnel, etc.) from
threats to confidentiality, integrity, or availability. Trade groups such as the Center for Internet
Security (CIS), the International Organization for Standardization (ISO), and the National
Institute of Standards and Technology (NIST) provide collections of security controls intended to
address critical areas of cybersecurity concern; however, these guidelines provide different
levels of detail, vary in prescriptiveness, and apply to different industries and organizational
structures. Ultimately, it is up to each organization to determine how to best implement security
controls to meet an organization's expectations for asset protection. As such, the security
practitioner's role centers around the selection, design, implementation, and management of the
policies, procedures, standards, and guidelines designed to implement these controls.
In the milestone assignment for this project, you examined employee training as a control
measure to reduce the incidents and effects of social engineering. As you saw, training is a key
method for incorporating security best practices. However, it is not the only type of control
measure relied on by cybersecurity professionals. In this project, you will incorporate instructor
feedback on the milestone as you envision a more comprehensive approach to security controls
at an organization.
In this project, you will analyze requirements, select appropriate security controls, and specify
methods to implement your selected controls to satisfy the requirements. You will demonstrate
your mastery of the following course competency: Design security controls and practices for humans in the system
Scenario
Your instructor will provide you with the specific scenario for this project in an announcement.
This scenario places you in the role of a security consultant for an organization. The scenario
will include additional requirements related to the proposal you addressed in Projects One and
Two. To complete this task, you will prepare service-level agreement requirement
recommendations for the internal stakeholder board identifying an approach to meeting the
requirements in the scenario.
Prompt
Prepare a brief that outlines the requirement recommendations for the service level agreement
and describes your approach to meeting the requirements of the scenario. You must address
the critical elements listed below. The codes shown in brackets indicate the course competency
to which each critical element is aligned.
Select two sub-controls that address the requirements of the scenario.
Control One: Justify how your selected control type (i.e., policy, standard, procedure, or
guideline) and implementation will meet the requirements.
Control Two: Justify how your selected control type (i.e., policy, standard, procedure, or
guideline) and implementation will meet the requirements.
Describe the necessity for a training program to address a specific social engineering threat.
Describe the expected outcomes of a training program that addresses the social engineering
threat you identified in the previous critical element.
What to Submit
Your submission should be 1 to 3 pages in length and should use double spacing,
12-point Times New Roman font, and one-inch margins. Sources should be cited
according to APA style. Use a file name that includes the course code, the assignment title,
and your name—for example, CYB_260_Project_One_Neo_Anderson.docx.