question archive Project: Department of Defense (DoD) Ready Purpose This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies
Subject:Computer SciencePrice: Bought3
|
Project: Department of Defense (DoD) Ready |
Evaluate compliance laws relevant to the U.S. Department of Defense.
Assess policy frameworks appropriate for an organization in a given scenario.
Evaluate security controls and standards for the seven domains of a typical IT infrastructure.
Develop DoD-compliant policies for an organization’s IT infrastructure.
The following tools and resources will be needed to complete this project:
DoD instructions or directives https://www.esd.whs.mil/dd/
U.S. Department of Defense (DoD) Chief Information Office Library
https://dodcio.defense.gov/Library/
Blue Stripe Tech's computing environment includes the following:
12 servers running the latest edition of Microsoft Server, providing the following:
Dynamic Host Configuration Protocol (DHCP)
Enterprise resource planning (ERP) application (Oracle)
Microsoft Exchange Server for email
Two Linux servers running Apache Server to host your website
Develop a list of compliance laws required for DoD contracts.
Determine which policy framework(s) will be used for this project.
List controls placed on domains in the IT infrastructure.
List required standards for common devices, categorized by IT domain.
Develop DoD-compliant policies for the organization’s IT infrastructure.
Describe the policies, standards, and controls that would make the organization DoD compliant.
Develop a high-level deployment plan for implementation of these polices, standards, and controls.
· Format: Microsoft Word (or compatible)
· Font: Arial, size 12, double-space
· Citation style: Your school’s preferred style guide
· Length of draft research documents: 2–4 pages
· Length of final report: 14–18 pages
I developed a list of compliance laws required for DoD contracts.
I listed controls placed on domains in typical IT infrastructure.
I listed required standards for common devices, categorized by IT domain.
I developed DoD-compliant policies and standards for my organization’s IT infrastructure
I described the policies, standards, and controls that would make my organization DoD compliant.
I listed all applicable DoD frameworks in the final report.
I included citations for all sources used in the report.
I followed the submission guidelines.
© 2022 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.