SUMMARY

SUMMARY

You are a security consultant for an information systems security firm and have a new health care provider client under HIPAA compliance. Your new client wants to know the requirements and the business drivers for securing the Remote Access Domain in their health care environment because it requires compliance with HIPAA. Similarly, your firm has a U.S. government DoD client who also wants you to perform a Remote Access Domain compliance audit per DoD Remote Access hardening guidelines and baseline requirements. They want you to focus on the Remote Access Domain only, and you are to use the DoD provided frameworks and STIGs previously found to summarize a Remote Access Domain Hardening strategy: http://iase.disa.mil/stigs/net_perimeter/other/other.html Lab #8 – Student Steps: Students should perform the following steps: 1. Log into a workstation with access to the Internet 2. The instructor will lead a classroom discussion regarding how compliance laws and business drivers define the requirements for the Remote Access Domain’s security solution. Review of the U.S. Department of Defense (DoD) Network Hardening Guidelines and other NIST 800-Series standards will be discussed 3. Use the Internet and SANS Institute website to identify risks, threats, and vulnerabilities commonly found in the Remote Access Domain 4. The students will review the STIGs available via the DISA websites and will review how to properly implement security based on DoD recommended Remote Access hardening guidelines http://iase.disa.mil/stigs/net_perimeter/other/other.html 5. Browse to the IASE/DISA STIGs website and download the following Secure Remote Computing Guideline Documents/ZIP File: u_remote_access_vpn_stig_v2r5_20110729.zip 6. Extract the.ZIP file and browse to the unzipped directory. 7. Open the U_Secure_Remote_Computing_V2R3_Overview.pdf, this reviews the potential vulnerabilities and configuration recommendations for secure remote access as per DoD guidelines. Review the following concepts from this overarching DoD standards document for secure remote access: a. SECURITY CONSIDERATIONS FOR REMOTE ACCESS AND TELEWORK b. ASSESSMENT, ENFORCEMENT, AND REMEDIATION SERVICES c. ENDPOINT SECURITY d. SECURITY READINESS REVIEW REQUIREMENTS 8. Review the following Remote Access security checklists and guideline documents: a. U_Remote_Access_Policy_V2R3_STIG.pdf b. U_Remote_Access_Server_(RAS)_V2R3_STIG.pdf c. U_Remote_Access_VPN_V2R3_STIG.pdf d. U_Remote_Endpoint_V2R3_STIG.pdf 9. A review of the security controls listed in each of the Secure Remote Access checklists can help mitigate the risks, threats, and vulnerabilities within the Remote Access Domain 10. Review how these security checklists and DoD guideline documents can help organizations baseline their security and achieve the compliance requirements in both government and commercial organizations 11. Draft an executive summary summarizing the top Remote Access Domain risks, threats, and vulnerabilities and include a description of the risk mitigation tactics you would perform in order to audit the Remote Access Domain for Compliance. Use the U.S. DoD Remote Access Hardening Guidelines as your example for a baseline definition for compliance.

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂

© 2020 customphdthesis.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.