question archive Create User Policy Learning Objectives and Outcomes Create a report detailing user access policies based on research
Subject:Computer SciencePrice:2.87 Bought8
Create User Policy Learning Objectives and Outcomes
Create a report detailing user access policies based on research.
Explain the details of user policy creation in organizations.ScenarioYou work for a large, private health care organization that has server, mainframe, and RSA user access.
Your organization requires identification of the types of user access policies provided to its employees.Sean, your manager, just came into your office at 6:00 p.m. on Friday and asks you to write a report detailing these user access policies. He needs you to research a generic template and use that as a starting point from which to move forward. He wants you to complete this task over the weekend as he has just been given a boatload of tasks in the management meeting which ended a few minutes ago. He is counting on you to take some of the load off his shoulders. The report is due to senior management next week.
Assignment Requirements Look for existing policy templates and examples from organizations of similar type.
Write a report detailing these user access policies based on your research, and place them into a table with an introduction explaining the following: who, what, when, why. Be sure to add a conclusion with a rationale for your selection.
Reference your research so Sean may add or refine this report before submission to senior management.
Answer:
User Access Policy, (Ruskwig, 1996-2015)
Purpose: This User Access Policy is to maintain an acceptable level of security in the protection of RSA Health Care data and information systems from unauthorized access. This policy will define the rules that are necessary to achieve protection and to ensure a secure and reliable operation of RSA Health Care information systems.
Policy:
IT Infrastructure Policy, (Info-Tech Research Group 1997-2015)
Purpose: The purpose of this policy is to allow information systems to be provided a better level of security achievable through configuration control, by delivering enhanced security capabilities. To achieve this goal is to be able to effectively control potential threats to possible vulnerabilities that cannot be mitigated by the capabilities innate in the RSA Healthcare’s information system which may lead to compromising the company’s information systems security.
Scope: This IT Infrastructure Policy is applicable to all deployed security systems in order to protect the RSA Healthcare’s physical and information property, which includes:
Policy:
Procedures: Configure appropriately and perform maintenance of the information security infrastructure.
Inbound rule. Block all access from outside except responses to requests from the LAN side.
Outbound rule. Allow all access from the LAN side to the outside.
NOTE: IT Manager will configure any other inbound and outbound firewall rules as needed.
Non-Compliance: Any violation to these policies or procedures will be considered a security breach, therefore will be dealt with accordingly depending on the nature of the violation.