Security Life Cycle and Configuration Management
Use the organization and characteristics, described in the Mega-Corp Case Study found in the Resources under the heading, Capella Resources, as the context in which to answer the bullet points in this assessment. The scoring rubric informs the level of detail that is required to achieve each competency level.
The sales manager for Berbee Consulting, sensing the potential loss of the Mega-Corp contract, arranged a meeting with the board of directors in which they provided a number of examples where failure of IT administrators to properly configure their devices has led to potential security vulnerabilities, which Berbee was able to detect and correct. You have been charged with creating a presentation for IT administrators and leadership that recommends the creation of procedures to secure configuration management.
Create a 15–18 slide PowerPoint presentation in which you complete the following:
Describe an effective process that organizations should follow to ensure proper configuration management of operating systems and applications.
Explain the role that security standards play in development of an information security program.
Describe commonly used information security management models and standards bodies.
Evaluate the roles that are appropriate for participation in a security administration and policy planning team.
Explain how password configuration and policy impact the overall strength of an organization’s access control and authentication strategies.
Recommend procedures to support coordinated effort between IT and information security, that will support the security life cycle and secure configuration of network devices.
Written communication: Written communication is free of errors that detract from the overall message.
APA formatting: Resources and citations are formatted according to current APA style and formatting.
Length: 15–18 slides. Provide detailed speaker’s notes where required.