Automated Rbac Case Study

Decent Essays
The Air Force should adopt USAA’s best practice and implement automated RBAC. RBAC limits access to network resources and system applications to only authorized users within predefined roles. It would simplify identity and access control compliance by managing access based on a user's role within the unit, not on an individual, user-by-user basis. Automating RBAC that leverages MILPDS position numbers will allow a significant amount of time to be returned to the workforce, increase our security posture and decrease unnecessary workload levied on our cyber security professionals.

Roles should be created based on functional positions and system access requirements not on individual user needs. Every Airman requires access to NIPRNET, a role

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Lab 1

    • 1712 Words
    • 7 Pages

    1. Goal Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are…

    • 1712 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Sabr Task Force Case Study

    • 1297 Words
    • 6 Pages

    FinCEN Data Management and Investigations within the Financial Crimes Task Force In 2009, The Internal Revenue Service – Criminal Investigations Division (IRS-CI) developed a model for regional task forces. The initiative created the Suspicious Activity Report Review Team (SAR-RT) task force program. The task forces were designed to review FinCEN data for case generation within the task force, and to refer potential case leads to other law enforcement organizations within the particular region. The Phoenix, Arizona IRS-CI office formed the Suspicious Activity Border Related (SABR) task force under the SAR-RT initiative in 2010.…

    • 1297 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    The problem statement facing the 4th ABCT: How to train and sustain the 4th ABCT to successfully assume the RAF mission; given a condensed timeline for training, equipping and developing its Soldiers for a deployment rotation to the NTC, so that they can best execute decentralized security operations in uncertain conditions while maintaining combat readiness after assuming the RAF mission. Following Bonnot and Walker’s seven-step process for building an organizational vision, the assessment above summarized in the problem statement above serves as a base understanding that helped guide the What, Why, and How of the initial vision for the 4th ABCT. The initial vision:…

    • 1540 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Joint Force 2020

    • 1383 Words
    • 6 Pages

    Issues that pose risk to missions are: “providing sufficient enabling capabilities, building partnership capacity, and securing DoD systems in cyberspace.” In example, an ally or partner’s lack of ability or willingness to support common goals may present an operational risk. When it comes to cyberspace, a failure to secure systems would pose a major risk to operations, personnel, and mission accomplishment. In such cases operational risk may be mitigated through the development of bilateral and multilateral capacity to improve interoperability to protect common interests through security cooperation, agreements, and…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Counterdrug

    • 746 Words
    • 3 Pages

    armed forces have proved their worth as a critical part of the total force. The operational successes of the National Guard prompted Congress to revisit the utilization of the Reserve Component (RC). Playing both an operational and strategic functions, the RC provides capabilities across the full range of military operations to meet U.S. defense…

    • 746 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The Federal Information Security Management (FISMA) was set up by the United States government for cyber security purposes such as to increase the level of security of software applications, systems and databases. As stated by (Kim, n.d.), “When FISMA was enacted, its purpose was to ensure that federal agencies secure the information contained in the non-defense information systems of the Unites States government”. To protect the systems and data it is important to have a security plan developed for not just federal agencies but also for the government contractors and organizations affiliated with the information. According to (Kim, n.d.), “These grades have trended slightly upward in recent years, with the grades from 2005 through 2007 being…

    • 166 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    The US Army has proven successful implementation of pilots in the warrant officer grade. Their pay is less than that of a fully commissioned officer, yet they have years of experience as enlisted personnel. Although the military is reducing its overall manpower numbers, a challenge is faced in retaining personnel in critical areas. In order to deter and defeat cyberspace threats, we must recruit and retain a superior cybersecurity team. Retention of these trained personnel will prove to be a daunting task since the civilian sector can offer a much more favorable compensation than the military.…

    • 873 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Biometric Analysis Paper

    • 791 Words
    • 4 Pages

    Introduction This paper includes a memorandum requesting consideration of a blended biometric solution for a specific company. Included in the memorandum is an analysis of the blended attacks that have occurred against the organization and the risks associated with the attacks. This memorandum is to include recommendations for best practices for blended biometric solutions that should be implemented both foreign and domestic by the security administrators for marginalization and prevention. December 04, 2016 MEMORANDUM TO: Executive Leadership FROM: Samanthea L. Price, Information Security Manager DATE: December 10, 2016 SUBJECT:…

    • 791 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    It has been a long established conceit that two actor authentication is essential for secure remote access scenarios. Anyone who has accessed private networks from the internet is familiar with the concept in one form or another. Whether the additional factors include Smart Badges, Security Tokens, Soft Certificates (encrypted code downloaded to a device to identify it as genuine), or a combination of the above, using two factor authentication has become a familiar and even expected part of our computing security routine and rightfully so. Two Factor Authentication has been so effective at reducing information compromise that many services are quickly adapting its safeguards for internal use as well. We have all read the alarmingly increasing…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The new technologies have integrated many sectors of combat system industries which needs a high level of qualification. Naomi Verdugo and Nehama E. Babin write in “The Impact of Advanced Technology on the U.S. Military”, that it is mandatory to adapt the skills of manpower to the requirements of new technologies. It will demand greater knowledge and more sophisticated skills than are presently. For instance, computer systems and networks remain advanced technology which is used now in the majority of telecommunication systems thus radically changing the profile of the users of these systems from soldiers to operators. This also will generate the need for skilled personnel in the maintenance sector because of the greater sophistication of new systems.…

    • 1300 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays