You have been hired as an auditor for a local university, which is preparing to undergo an accreditation inspection to confirm that security controls

You have been hired as an auditor for a local university, which is preparing to undergo an accreditation inspection to confirm that security controls

You have been hired as an auditor for a local university, which is preparing to undergo an accreditation inspection to confirm that security controls are in place and adhered to and that data is protected from unauthorized access internally and externally. As the auditor, you play a key role in ensuring compliance. As the organization prepares for its three-year accreditation, you are tasked with gathering the artifacts that will be used to build the accreditation package. The accreditation package will be submitted under the Framework (RMF) and will use the controls found in NIST SP 800-53 and NIST SP 800-53A. The controls to be audited are provided in the worksheet. Your university has an IT staff consisting of the following personnel: CIO: in charge of overall network operations and. Information Security Officer: implements and manages cybersecurity policies. System Analysts: monitor security features implemented on hosts (laptops, desktops) and server-side security (NIPS, NIDS).Auditors: validate baseline compliance of systems in accordance with Security Technical Information Guide (STIG), NIST, and federal, state and local policies, regulations, and laws. System Administrators: manage data and applications on servers. Network Administrators: manage all switches, routers, firewalls, and sensors. Desktop Administrators: administer hardware and software to users and manage day-to-day troubleshooting calls from users. Help Desk: acts as the liaison between the customer and administrators through the use of a Ticket Management System (TMS).To ensure separation of duties, all employees are provided a written list detailing their roles and responsibilities. Terminated employees are debriefed, and physical and logical access controls are removed to prevent further access. Users are defined as those staff without elevated privileges that can affect the configuration of a computer or networked device. Advanced users have the rights and credentials to physically make a configuration change to a networked device or direct a configuration change through positional authority. All advanced users complete the same initial user agreement as standard users as well as a nondisclosure agreement (NDA). There is no required training for standard and advanced users. For automated account management, the university uses Active Directory (AD).Onboarding new users and managing access follows this process: When a user arrives, they visit the help desk in person and submit a request to have an account created. All users must read and sign a user agreement outlining the rules and terms of use before they are given network access. These forms are reviewed annually by the ISO and stored digitally on the network for three years from the date of termination. The organization defines a time period for each type of account after which the information system terminates temporary and emergency accounts (14 days); all accounts that have not been accessed for 45 days are suspended and, after 90 days, removed from Active Directory. The help desk creates a ticket that includes the signed user agreement and assigns the ticket to the system administrators. The system administrator (SA) creates the account and assigns the user access based on their role. Users are assigned least privilege when an account is created. Discretionary access control is created for university departments to allow internal users to share information among defined users. These processes aren’t audited and Active Directory has become a massive database containing accounts of users who are no longer employed by the organization as well as their files. No negative impact has been observed by this. System admins track when users log in and log out so security and software patches can be pushed to the users’ machines. This tracking mechanism also contributes to nonrepudiation in the event of a cybersecurity incident. Additionally, the machine is configured to log the user out if there is no activity on the user’s computer for two minutes. After three failed login attempts, the account will be locked and will require the user to visit the help desk in person to validate their credentials and unlock the account.

Answer preview to you have been hired as an auditor for a local university, which is preparing to undergo an accreditation inspection to confirm that security controls

You have been hired as an auditor for a local university which is preparing to undergo an accreditation inspection to confirm that security controlsAPA

2031 words

Get instant access to the full solution from by clicking the purchase button below








We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.