Lab - Develop Cybersecurity Policies and Procedures
Lab - Develop Cybersecurity Policies and Procedures
Introduction
Information security policies provide a framework for organizations to manage and protect
their assets, and a safeguard that organizations employ to reduce risk. Students will be
required to compare information security policies to determine the differences between
policies, standards, guidelines, and procedures. Students will then develop an information
security policy to address existing vulnerabilities identified by an internal audit.
For example, a password policy sets the standard for creating strong passwords and
protecting passwords. A password construction guide defines how to create a strong
password and provides best practice recommendations. The password procedure provides
instructions on how to implement the strong password requirement. Organizations do not
update policies as frequently as they update procedures within the information security
policy framework.
Goals
This project includes the following objectives:
Part 1: Review the scenario
Part 2: Review and prioritize audit results
Part 3: Developing policy documents
Part 4: Develop a plan to disseminate and evaluate policies
Requirements
You will need Internet access for the following websites, videos, and documents:
SANS Security Policy
Projecthttps://www.sans.org/security-resources/policies/
Information Security Policy (video)
https://youtu.be/ZlKgMUOpMf8
Main Computer Security Vulnerabilitieshttps
://www.n-able.com/features/computer-security-vulnerability
Information Security Policy Development Guide for Large and Small Companies (pdf)
https://www.sans.org/reading-room/whitepapers/policyissues/information-security-
policy-development-guide-large-small-companies-1331
Technical writing for IT security policies in five easy
stepshttps://www.sans.org/reading-room/whitepapers/policyissues/technical-writing-
security-policies-easy-steps-492
Situation
ACME Healthcare is a healthcare services company that operates more than 25 medical
facilities, including patient care, diagnostics, outpatient care and emergency care. The
organization has experienced several data breaches over the past five years. These data
breaches have cost the organization financially and damaged its reputation.
The executive leadership team recently hired a new Chief Information Security Officer
(CISO). The new CISO has brought in one of the leading cybersecurity penetration teams to
conduct a full security audit across the organization. This independent contractor performed
the audit and discovered the following vulnerabilities:
1) Several accounts of employees who no longer work at ACME were identified.
2) Multiple user accounts allowed unauthorized and higher level privileges. These
accounts accessed systems and information without formal authorization.
3) Multiple devices and systems allowed unsecured remote access.
4) 40% of all audited organization passwords were cracked within 6 hours.
5) Password expiration was not standardized.
6) Sensitive files were found unencrypted on users' devices.
7) Several wireless access points used WEP for encryption and authentication.
8) Evidence indicates that confidential email was sent to and from employees' homes
and mobile devices without encryption.
9) Intrusion detection logs were infrequently reviewed and analyzed.
10) Employees used devices with confidential company data for private use.
11) Employee devices were left unattended and employees failed to log out of the
company's network and data systems.
12) Inconsistent device configurations and updates were performed.
13) Several firewall rules have been set to allow all traffic unless specifically denied.
14) The company's servers were not updated with the latest patches.
15) The intranet web server allowed users to change their personal information,
including contact information.
Instructions
Several accounts were identified When an employee leaves the The former employee may gain
for employees who are no longer company: unauthorized access to proprietary
employed by ACME. Review all access permissions and confidential information and
equipment. Anyone with the former
Retrieve employee data if
employee's credentials can gain
applicable
unauthorized access to the internal
Terminate access and reset all system.
passwords
Several user accounts allowed Assign the least privilege to Least privilege allows the user to
unauthorized privileges and higher perform the task perform all necessary tasks without
level access to systems and Logging in when using elevated the risk of unintentionally causing
information without formal privileges systemic changes.
authorization.
Multiple devices and systems Disable insecure remote access, Insecure remote access transmits
allowed unsecured remote access. such as Telnet data in clear text. Transmitting
Require secure remote access, clear text can expose sensitive
such as SSH and VPN information, such as user
credentials, for malicious actors to
perform reconnaissance and
attacks.
40% of all audited organization New password policy: When passwords are cracked, the
passwords were cracked within 6 Implement 2FA or MFA attacker can gain unauthorized
hours. access and change passwords to
User Passphrase
lock out authorized users.
Change passwords only after
evidence of compromise
Do not reuse old passwords
Do not reuse passwords across
different applications
Enable copy/paste passwords
Educate users on basic
cybersecurity
Many wireless access points use Upgrade wireless access points WEP is prone to man-in-the-middle
WEP for encryption and with the most secure encryption attacks and the key is easily
authentication. and authentication available cracked and difficult to distribute to
users.
The company's servers were not Establish a plan to update/test the Regular updates can protect data,
updated with the latest patches. latest patches at regular intervals. fix security vulnerabilities, and
improve the stability of the
operating system and applications.
Blank line, no additional information