Week 4 - Implementation
Week 4 - Implementation
Quincey Jackson
BioHuman proposed to implement the following baseline controls into the risk
management framework: AC-1, AT-1, AU-1,CA-1,IA-1, IR-1, MA-1, PT-1, RA-1, SC-1, and
SI-1. Table 1 displays the security-control identifiers and complete names of each family.
The newly selected security controls will cover the policy and procedures of each control
within the payroll system. Adopting and implementing policies and procedures will be essential
for adequate risk management of BioHuman’s high-impact payroll system. With organization
members accessing the information system from remote locations, on corporate networks, and
via IoT devices, the newly implemented policies and procedures are important because they will
contribute to security and privacy assurance. According to NIST (2020), policies are also
flexible. They can be included as part of the general security and privacy policy or be
represented by multiple policies. Procedures are needed because they describe how policies and
ensure that all controls are working together to achieve maximum protection. There are no
organizations implement security safeguareds that are tailored to fit physical, technical, and
physical access to company resources (Kruse, 2017). An example of a physical security control
is the Acccess Control safeguard that was selected. This type of safeguard is designed to prevent
access to HumanBio’s corporate offices. A receptionist or clerical worker with a keycard at the
corporate office would only be authorized to use their keycards in limited places of the office
building. Management however would have a keycard that has full access to the building. The
receptionist has no need for a keycard with full access. This is way to limit internal and external
attack.
Technical safeguards are similar to physical safeguards because both are designed to limit
access to only authorized personnel (Kruse, 2017). Access control can also be categorized as a
technical safeguard. Instead of facility access and physical safeguards, technical access control
would limit data and private information to authorized users only. For example, if an
organization member needed to reset their password to the payroll system, only Human resources
would be equipped to handle this matter. Allowing a team member or manager to change your
password or access information from your account could cause security threats. Human
resources would have a designed plan for readministering a new password link.
Administrative safeguards make use of resources such as policies, procedures and
organizational-wide practices (Kruse, 2017). For the BioHuman payroll system, policies and
procedures will be used for every security control implemented, to ensure all members and users
of the payroll system will be held accountable for all activity on the system.
Physical safeguards like Access Control and administrative safeguards like Awareness
Training controls are two controls that would help manage both internal threats, however, there
may be technical areas that need to be protected more. Adding technical safeguards like
Maintenance or Incident Reporting; two controls that constantly updates the systems and makes
reports on behavior within the information system while suggesting new controls to adopt is an
example of how BioHuman’s controls are implemented to meet physical, technical and
administrative requirements.
Conclusion
Without policies and procedures adopted to set the expectations for proper and adequate risk
management, the information systems will be full of threats and vulnerabilities that put the
organization and information systems at serious risk of undergoing an attack. While policies and
procedures are not enough to protect an information system, they are needed to govern the
minimum security requirements of an information system (FIPS, 2006). Therefore, AC-1, AT-1,
AU-1,CA-1,IA-1, IR-1, MA-1, PT-1, RA-1, SC-1, and SI-1 will be implemented and tailored to
meet physical, technical and administrative requirements. This will give the organization the best
Kruse, C. S., Smith, B., Vanderlinden, H., & Nealand, A. (2017). Security techniques for the
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf
Pub, FIPS 200. (2006). Standards for security categorization of federal information and
Ross, R., Katzke, S., Johnson, A., Swanson, M., Stoneburner, G., Rogers, G., & Lee, A. (2005).