DISCUSSION 3
Before you begin: Read the Project #1 description (attached to the Project #1a assignment folder) paying special attention to the Red Team’s report.
For this week’s discussion our focus will be upon developing a brief (1-2 page) forensics data collection plan to be used during a Red Team exercise. Your plan will be used as part of training exercise for incident response personnel to help them learn to identify and collect evidence.
Your first task is to analyze the Red Team’s report to determine what they attacked or what attack vectors were used.  Next, analyze the environment to determine what types of forensic evidence should be collected after the attack(s) and where that evidence can be collected from. You should consider both volatile sources such as RAM (memory) and static sources such as disk drives, thumb drives (USB storage devices), etc. After you have identified the types of evidence and the devices from which evidence should be collected, document that in your short paper (the “plan”).
At a minimum your plan must document evidence collection for three specific attack vectors or vulnerabilities that were exploited by the Red Team as part of its penetration testing. For each vector or vulnerability, document what type of evidence could be collected and where the evidence should be collected from.
For your critiques this week, you should review and critique the forensic data collection plans written by two of your peers. You must also post at least two follow-ups or response postings (in any thread).
https://www.betterevaluation.org/en/evaluation-options/after_action_review
 
DISCUSSION 4
READINGSS
https://csrc.nist.gov/projects/role-based-access-control
https://insights.sei.cmu.edu/blog/separation-of-duties-and-least-privilege-part-15-of-20-cert-best-practices-to-mitigate-insider-threats-series/
https://www.csoonline.com/article/3647316/red-vs-blue-vs-purple-teams-how-to-run-an-effective-exercise.html
https://www.csoonline.com/article/2126101/5-tips-for-a-successful-penetration-testing-program.html
DISCUSSION QUESTION
 
Write a 3 to 5 paragraph briefing paper that identifies and explains the three most important reasons why Sifers-Grayson should invest in an Identity Governance & Administration solution to help combat insider threat.
Your audience is a mixed group of managers from across Sifers-Grayson’s operating areas (company HQ’s, Engineering, Finance & Accounting, Program Management, Sales & Marketing). Some of these managers are familiar with the importance of separation of duties and least privilege but most are not. One or two of the managers might know the definition for RBAC. Your briefing paper needs to address these information needs as well as discussing why information should be labeled as to its sensitivity (“classification”) and ownership.
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your article.
 
 

CSIA 310 DISC 3
We have updated our contact contact information. Text Us Or WhatsApp Us+1-(309) 295-6991