Incident Response Team Access and Authorization Policy

Incident Response Team Access and Authorization PolicyDescribe the key components within the incident response plan you identified. Be sure to cite the plan by including a link.
Outline the six-step methodology for performing incident response. List each step and its purpose. How closely does the plan that you reviewed follow this methodology?
Describe how this policy would be associated with an incident response plan.
Policy Statement
Insert policy verbiage here.
Purpose/Objectives
Insert the policy’s purpose as well as its objectives; use a bulleted list for the policy definition. Define the incident response team members and the authorization and authority granted to them during a crisis or while securing an incident situation.
Scope
Define this policy’s scope and whom it covers. What elements, IT assets, or organization-owned assets are within the scope of this policy? What access and authority are granted to the incident response team members that may be outside of standard protocol?
Standards
Does this policy point to any hardware, software, or configuration standards? If so, list them here and explain the relationship of this policy to these standards
Procedures
Explain how you intend to implement this policy across the organization. Also, define and incorporate the six-step incident response approach here along with how the chain of custody must be maintained throughout any evidence collection process.
Guidelines
Explain any roadblocks or implementation issues that you must address in this section and how you will overcome them per defined policy guidelines.
Identify and define an incident scenario for Bankwise Credit Union. The incident must involve some type of cybersecurity issue.
Create a brief abstract of the scenario to be approved by C-level executives.
NO PLAGIARISMRequirements: 3-4-Pages | _____________________Order any type of Service We Provide We are the best assignment service that can satisfy student’s demands in different scientific fields. We perform tasks of any kind. Our specialists provide diverse custom assignment writing services to students from all over the world every day. You can contact us for assistance with: • Essays of any type (application, scholarship, argumentative, personal, informative, persuasive, compare and contrast, narrative, analytical, cause and effect, critical, process, descriptive, expository essays); • Homework, • Assignments, • Reviews of all types (for a book, an article, or a film), • Reports, • Annotated bibliography, • Projects, • Thesis, • Term papers, • Presentations, • Lab works, • Research papers, • Speeches, • Critical thinking, • Capstone projects; • plan; • Coursework’s; • Dissertations. The list is far from complete! Representatives of our student assignment service are connoisseurs of the peculiarities of presentation in regards to academics. Part 1: Research Incident Response Plans (0/2 completed)
Note: In this part of the lab, you will research incident response teams to form a basis for their purpose and usage. Understanding the reason behind an incident response team is key to understanding the related policies and procedures.1. Using your favorite search engine, search for a sample incident response plan.2. Review the plan.3. Describe the key components within the incident response plan you identified. Be sure to cite the plan by including a link.4. In your browser, navigate to “A Six-Stage Methodology for Incident Response,” at http://my.safaribooksonline.com/book/networking/incident-response/1578702569/a-methodology-for-incident-response/ch03lev1sec2.5. Review the six steps listed on the website.6. Outline the six-step methodology for performing incident response. List each step and its purpose. How closely does the plan that you reviewed follow this methodology?Note: It is impossible to know at the beginning of any incident whether the case might become a court case. A good incident response team should approach every incident assuming that evidence documentation is required.Part 2: Create an Incident Response Policy (0/7 completed)
Note: There are many types of incident response plans. Remember that a plan is different from a policy. A policy is a high-level document that describes the organization’s stance on the particular topic and how it will comply with related governance and laws. A plan, on the other hand, is how the policy will be executed. An incident response plan should be generic enough to cover a variety of scenarios but also specific enough that an organization can quickly mobilize during an incident. Names of specific people should never be used in an incident response plan. Rather, roles and titles should define who is responsible for what portion(s) of the plan.1. Navigate to “Security Policy Templates” at https://www.sans.org/information-security-policy/, then locate and review the “Security Response Plan Policy”.2. Describe how this policy would be associated with an incident response plan.Note: When responding to an incident, remember who the provider of information is and who the consumer is. Senior management approves the response policy and budget, but it does not possess the subject matter expertise to handle the incident. Meanwhile, the incident response team should make only recommendations to management, not make decisions that might impact business. It is up to senior management to either give or deny approval.Management remains the consumer and chief decider, based on information provided to it by the experts.3. Review the following characteristics of the fictional Bankwise Credit Union:• The organization is a local credit union that has several branches and locations throughout the region.
• Online banking and use of the internet are the bank’s strengths, given its limited human resources.
• The customer service department is the organization’s most critical business function.
• The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
• The organization wants to monitor and control use of the internet by implementing content filtering.
• The organization wants to eliminate personal use of organization-owned IT assets and systems.
• The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
• The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training.
• The organization wants to create an incident response team to deal with security breaches and other incidents if attacked and provide full authority for the team to perform whatever activities are needed to maintain chain of custody in performing forensics and evidence collection.
• The organization wants to implement this policy throughout the organization to provide full authority during a crisis to the incident response team over all physical facilities, IT assets, IT systems, applications, and data owned by the organization.4. Create an incident response policy that grants team members full access and authority to perform forensics and maintain a chain of custody for physical evidence containment. Create this policy for the Bankwise Credit Union.Bankwise Credit Union
Incident Response Team – Access and Authorization PolicyPolicy Statement
Insert policy verbiage here.Purpose/Objectives
Insert the policy’s purpose as well as its objectives; use a bulleted list for the policy definition. Define the incident response team members and the authorization and authority granted to them during a crisis or while securing an incident situation.Scope
Define this policy’s scope and whom it covers. What elements, IT assets, or organization-owned assets are within the scope of this policy? What access and authority are granted to the incident response team members that may be outside of standard protocol?Standards
Does this policy point to any hardware, software, or configuration standards? If so, list them here and explain the relationship of this policy to these standardsProcedures
Explain how you intend to implement this policy across the organization. Also, define and incorporate the six-step incident response approach here along with how the chain of custody must be maintained throughout any evidence collection process.Guidelines
Explain any roadblocks or implementation issues that you must address in this section and how you will overcome them per defined policy guidelines.Challenge Exercise (0/2 completed)
Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.Having an incident response plan is a great first step. However, if the plan is never tested, it likely will not work in a scenario when needed. One way to test an incident response plan is to execute a tabletop exercise. During a tabletop exercise, a probable scenario is created, and all incident response team members are required to meet and discuss the scenario. The purpose of the exercise is to see which parts of the plan work well and which parts fail. Once the exercise has been completed, the incident response team (along with policy and plan writers and other stakeholders) meet to update the plan as necessary.As the CISO and leader of the organization’s incident response team, you are required to hold an annual tabletop exercise involving the incident response team. Before the exercise can begin, you must complete the following tasks:Identify and define an incident scenario for Bankwise Credit Union. The incident must involve some type of cybersecurity issue.Create a brief abstract of the scenario to be approved by C-level executives.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 929 473-0077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code GURUH