Design of a secure corporate identity


Assignment Topic - Operating Systems and Application Security Hardening

In this assessment, students will be required to design and implement a corporate identity and access management solution. This is a practical assessment, you will need to conduct research to determine the requirements and controls and fully implement your findings using virtual machines. It is an individual assessment which will be submitted in the form of a report.

The first task will commence with determining the security requirements for this environment. Consideration should be given to both the security requirements of the environment itself (e.g. ensuring confidentiality, integrity and availability of the identity/access data itself) and the security implications that the identity and access management system will have on other corporate systems (e.g. ensuring it has the flexibility to support a variety of security best practices for other systems which use it as an identity / access control source). Students should refer to one or more cyber-security frameworks (e.g. the Australian Signals Directorate Strategies to Mitigate Cybersecurity Incidents, or the NIST Cybersecurity Framework) when making recommendations in their report.

Once the security requirements have been considered, students must detail the specific security hardening controls that they will implement in a virtual machine environment to address these requirements. It would be expected that the noted security hardening requirements will have associated controls implemented in the virtual machine environment. N.B. This assessment should be considered from the perspective of a real-world organisation. As such, the fact that this is a case study environment is not grounds for non-implementation of security controls. Additional specification of the target environment is outlined in the Assessment Scenario section of this document.

The second major task will be to comprehensively document the security control implementation in a virtual machine environment which consists of at least one management server, one internal (managed) Windows client, one internal (managed) Linux client and one BYOD (unmanaged) device. A minimum of two case study services must be implemented and integrated with the identity and access management solution, a file server (demonstrated on all client devices) and user logon (demonstrated on the managed client devices). Additional case study services may also be implemented.

Additional virtual machine s may be required to fully explore and demonstrate the implemented security functionality. The documentation of this process should start from the installation of the guest operating system s and conclude with a fully operational and secure corporate environment. Although all stages of the implementation should be documented, the focus of the implementation documentation should be on security controls.

In summary, this report consists of two major sections (in addition to an executive summary, introduction, conclusion and reference list):

1. Investigation (in concert with one or more suitable cybersecurity frameworks) and design of a secure corporate identity and access management solution. This should be followed by an indication and discussion of the specific controls that will be implemented in Section 2, including justifying why they are important, and if any controls will not be implemented, justifying their exclusion.

2. Practical implementation of the environment using virtual machines. This section is to be documented via the use of annotated screenshots. Please ensure that the screenshots are comprehensive as the virtual machines will not be submitted as part of this assessment. While all sections of the implementation need to be documented, additional focus (screenshots) should be made on sections of the implementation that relate to Operating System and Application security (in contrast to general set up).

The word limit for this assessment is 2,500 words, however the implementation screenshots and their associated (brief) annotations do not count towards the word limit.

All the tutors of our Operating Systems and Application Security Hardening Assignment Help service are highly apt and competent and put maximum effort, in order to make your assignment paper of the top-quality.

Tags: Operating Systems and Application Security Hardening Assignment Help, Operating Systems and Application Security Hardening Homework Help, Operating Systems and Application Security Hardening Coursework, Operating Systems and Application Security Hardening Solved Assignments 

Attachment:- Operating Systems and Application Security.rar

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Design of a secure corporate identity
Reference No:- TGS03055071

Expected delivery within 24 Hours