Write My Paper Button

Create a Security Assessment and Testing Strategic Plan Hide Folder InformationTurnitin™This assignment will be submitted to Turnitin™.Instructions Background In today’s complex digital environment, organization

Create a Security Assessment and Testing Strategic Plan Hide Folder InformationTurnitin™This assignment will be submitted to Turnitin™.Instructions

Background In today’s complex digital environment, organizations must contend with a wide array of cyber threats that are continuously evolving, such as ransomware and sophisticated supply-chain breaches. To effectively defend against these evolving threats, adopting a proactive and comprehensive approach to cybersecurity is essential. This involves not only implementing security controls but also continuously assessing their effectiveness and identifying areas for improvement. A security assessment and testing strategic plan enables the measurement of the effectiveness of deployed cybersecurity controls and the identification of potential gaps in an organization’s cybersecurity posture. This plan focuses on the Govern and Detect functions to establish a comprehensive security assessment and testing strategy. Also, this plan outlines the tools, systems, services, policies, procedures, and assessment practices necessary to achieve a robust security posture. 

Instructions Assignment Description: Using the NIST Cybersecurity Framework (CSF) 2.0, outline a security assessment and testing strategic plan focusing on the Govern and Detect functions. Your outline should identify key components within each function, including relevant tools, systems, services, policies, procedures, and assessment practices. 

Deliverables: 

Governance (GV) Outline:  Briefly describe how the Govern function integrates cybersecurity risk management into the organization’s overall governance. For two subcategories within the Govern function (e.g., GV-2: Risk Management Strategy, GV-4: Policies, Processes, and Procedures), list one example of each of the following:  Policy  Tool/System or Service  Assessment Practice  Detection (DE) Outline:  Briefly describe how the Detect function identifies the occurrence of a cybersecurity event. For two subcategories within the Detect function (e.g., DE-1: Anomalies and Events, DE-3: Detection Processes and Procedures), list one example of each of the following:  Tool/System or Policy  Service or Procedure  Assessment Practice  Key Components: Briefly list three specific examples of:  Tools, Systems, and Services relevant to Govern and Detect. Policies and Procedures relevant to Govern and Detect. Assessment Practices relevant to Govern and Detect.  Instructions: 

Your response should relate directly to the information in the “Lesson 6 Assignment” excerpts.  Focus on clearly and concisely outlining the key elements of a security assessment and testing strategy based on the Govern and Detect functions of the NIST CSF 2.0.  Length: This assignment must be 7 pages (excluding the title and reference pages). 

References: Include 4 scholarly resources.

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?