0% found this document useful (0 votes)
40 views5 pages

Week 4 - Implementation

Uploaded by

api-694098467
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
40 views5 pages

Week 4 - Implementation

Uploaded by

api-694098467
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 5

Understanding Security Controls

Quincey Jackson

CSOL, University of San Diego

CSOL-530-04-SU22 - Cyber Security Risk Management

July 25, 2022


Review of Selected Controls

BioHuman proposed to implement the following baseline controls into the risk

management framework: AC-1, AT-1, AU-1,CA-1,IA-1, IR-1, MA-1, PT-1, RA-1, SC-1, and

SI-1. Table 1 displays the security-control identifiers and complete names of each family.

Table 1: Security and Privacy Control Families (NIST SP 800-53, 2020)

Implementing Policies and Procedures

The newly selected security controls will cover the policy and procedures of each control

within the payroll system. Adopting and implementing policies and procedures will be essential

for adequate risk management of BioHuman’s high-impact payroll system. With organization

members accessing the information system from remote locations, on corporate networks, and

via IoT devices, the newly implemented policies and procedures are important because they will

contribute to security and privacy assurance. According to NIST (2020), policies are also

flexible. They can be included as part of the general security and privacy policy or be

represented by multiple policies. Procedures are needed because they describe how policies and

controls are implemented (NIST, 2020).

Implementing to meet Physical, Technical and Administrative Requirements


To achieve adequate protection from the selected security controls, it is imperative to

ensure that all controls are working together to achieve maximum protection. There are no

universal controls capable of covering every border of an information system so cybersecurity

organizations implement security safeguareds that are tailored to fit physical, technical, and

administrative requirements of their information systems. Physical safeguards prevents or limits

physical access to company resources (Kruse, 2017). An example of a physical security control

is the Acccess Control safeguard that was selected. This type of safeguard is designed to prevent

any unauthorized access to information or resources. An example of this would be physical

access to HumanBio’s corporate offices. A receptionist or clerical worker with a keycard at the

corporate office would only be authorized to use their keycards in limited places of the office

building. Management however would have a keycard that has full access to the building. The

receptionist has no need for a keycard with full access. This is way to limit internal and external

attack.

Technical safeguards are similar to physical safeguards because both are designed to limit

access to only authorized personnel (Kruse, 2017). Access control can also be categorized as a

technical safeguard. Instead of facility access and physical safeguards, technical access control

would limit data and private information to authorized users only. For example, if an

organization member needed to reset their password to the payroll system, only Human resources

would be equipped to handle this matter. Allowing a team member or manager to change your

password or access information from your account could cause security threats. Human

resources would have a designed plan for readministering a new password link.
Administrative safeguards make use of resources such as policies, procedures and

organizational-wide practices (Kruse, 2017). For the BioHuman payroll system, policies and

procedures will be used for every security control implemented, to ensure all members and users

of the payroll system will be held accountable for all activity on the system.

Physical safeguards like Access Control and administrative safeguards like Awareness

Training controls are two controls that would help manage both internal threats, however, there

may be technical areas that need to be protected more. Adding technical safeguards like

Maintenance or Incident Reporting; two controls that constantly updates the systems and makes

reports on behavior within the information system while suggesting new controls to adopt is an

example of how BioHuman’s controls are implemented to meet physical, technical and

administrative requirements.

Conclusion

Some information systems may accommodate thousands of members in an organization.

Without policies and procedures adopted to set the expectations for proper and adequate risk

management, the information systems will be full of threats and vulnerabilities that put the

organization and information systems at serious risk of undergoing an attack. While policies and

procedures are not enough to protect an information system, they are needed to govern the

minimum security requirements of an information system (FIPS, 2006). Therefore, AC-1, AT-1,

AU-1,CA-1,IA-1, IR-1, MA-1, PT-1, RA-1, SC-1, and SI-1 will be implemented and tailored to

meet physical, technical and administrative requirements. This will give the organization the best

shot at maximum, cost-efficient, protection.


References

Kruse, C. S., Smith, B., Vanderlinden, H., & Nealand, A. (2017). Security techniques for the

electronic health records. Journal of medical systems, 41(8), 1-9.

NIST (2020) NIST Special Publication 800-53 Revision 5. Retrieved From

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf

Pub, FIPS 200. (2006). Standards for security categorization of federal information and

information systems. NIST FIPS, 200.

Ross, R., Katzke, S., Johnson, A., Swanson, M., Stoneburner, G., Rogers, G., & Lee, A. (2005).

Recommended security controls for federal information systems. NIST Special

Publication, 800, 53.

You might also like