Assessment Description
This is a practical task. You will be required to develop, implement and evaluate system and application security. Your assessor will observe your ability to undertake following tasks in a simulated environment. Ask your trainer for further guidance on your assessment task, submission procedure and timeline.
Part A – Develop System And Application Security
- Identify enterprise ICT system or application security policies.
- Identify security requirements for the ICT system or application.
- Write an ICT system or application security plan according to the enterprise and ICT system or application security policies.
- Identify standards that will apply to the ICT system or application.
- Identify criteria for performing risk-based audits against the ICT system or application.
- Develop processes and procedures to mitigate the introduction of vulnerabilities during the engineering process.
- Integrate applicable information security requirements, controls, processes, and procedures into ICT system and application design specifications according to requirements already established in earlier steps.
Part B – Implement System And Application Security
- Execute enterprise and ICT system or application security policies.
- Apply and verify compliance with the standards against which to engineer the ICT system or application (identified in part A).
- Perform processes and procedures (developed in earlier step) to mitigate the introduction of vulnerabilities during the engineering process.
- Perform secure configuration management practices.
- Validate (check) that the engineered ICT system and application security controls meet the specified requirements (identified in part A).
- Re-engineer security controls to mitigate vulnerabilities identified during the operations phase.
- Ensure integration of information security practices throughout the SDLC process.
- Document ICT system or application security controls addressed within the system.
- Explain or demonstrate how you would practise secure coding within the context of the security policies you have developed and implemented.
Part C – Evaluate System And Application Security
- Review new and existing risk management technologies to achieve an optimal enterprise risk posture.
- Review new and existing ICT security technologies to support secure engineering across the SDLC phases.
- Explain or demonstrate how to continually assess the effectiveness of the information system controls based on risk management practices and procedures.
- Assess and evaluate system compliance with corporate policies and architectures.
- Assess system maturation and readiness for promotion to the production stage.
- Collect lessons learned from integration of information security into the SDLC and use to identify improvement actions.
- Collect, analyse and report performance measures.
The post Ictnwk510 Develop Implement And Evaluate System And Application Security appeared first on My Assignment Online.