Define the scope of the policy (the personnel, equipment, and processes to which the policy applies). Provide guidelines for

 

Week 8 Assignment – System Security Monitoring, Patch Management, and Update Policies

Introduction

In this assignment, you will develop  corporate policies for system security monitoring, patch management, and  updates that cover both wired and wireless components. A web search  will provide multiple examples of policy documents. The following  resources may also be helpful as you draft your policy documents: 

  • SANS. No date. CIS Critical Security Controls. https://www.sans.org/critical-security-controls/?msc=main-nav     
    • This resource provides a list of case studies highlighting how  security professionals have made improvements in their security  controls.
  • SANS. No date. Security Policy Templates. https://www.sans.org/information-security-policy/     
    • This resource provides a number of security policy templates that might be helpful in drafting your policy documents.

The specific course learning outcome associated with this assignment is: 

  • Recommend best practices for monitoring, updating, and patching systems.

Instructions

Write a 6–10 page paper in which you: 

  • Establish a system security monitoring policy addressing the need  for monitoring, policy scope, and exceptions and supported by specific,  credible sources.     
    • Justify the need for monitoring.
    • Define the scope of the policy (the personnel, equipment, and processes to which the policy applies).
    • Provide guidelines for policy exceptions, if approved by the IT and Security departments.
  • Establish a system security patch management and updates policy  addressing the need for patch management and updates, policy scope, and  exceptions and supported by specific, credible sources.     
    • Justify the need for patch management and updates, aligned with ISO/IEC 27002.
    • Define the scope of the policy (the personnel, equipment, and processes to which the policy applies).
    • Provide guidelines for policy exceptions, if approved by the IT and Security departments.
  • Support your main points, assertions, arguments, or conclusions  with at least four specific and credible academic sources synthesized  into a coherent analysis of the evidence.     
    • Cite each source listed on your source page at least one time within your assignment.

    Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

    Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

    Do you need an answer to this or any other questions?