Uploaded by ronica coorey

security354354

advertisement
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title
Assessor
Unit(s)
Assignment title
BTEC Higher National Diploma in Computing
Mis. Gimhani
Internal Verifier
Unit 05: Security
EMC Cloud Solutions
Student’s name
List which assessment
criteria the Assessor has
awarded.
Pass
Merit
Distinction
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief?
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the
student work?
Has the work been assessed
accurately?
Y/N
Y/N
Y/N
Is the feedback to the student:
Give details:
• Constructive?
• Linked to relevant assessment
criteria?
Y/N
Y/N
• Identifying opportunities for
improved performance?
• Agreeing actions?
Does the assessment decision need
amending?
Sandun Blazon Lanka Poulier
Y/N
Y/N
Y/N
Unit - 05
011362
Assessor signature
Date
Internal Verifier signature
Date
Programme Leader signature(if
required)
Date
Confirm action completed
Remedial action taken
Give details:
Assessor signature
Date
Internal Verifier
signature
Date
Programme Leader
signature (if required)
Date
Sandun Blazon Lanka Poulier
Unit - 05
011362
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Sandun Poulier/ KAN-A - 011362
Unit Title
Unit 05: Security
Assignment Number
1
Assessor
2020.10.15
Date Received 1st
submission
Submission Date
Mis. Gimhani
Date Received 2nd
submission
Re-submission Date
Assessor Feedback:
LO1. Assess risks to IT security
Pass, Merit & Distinction
P1
Descripts
LO2. Describe IT security solutions.
P2
M1
D1
Pass, Merit & Distinction
Descripts
P4
M2
D1
P3
LO3. Review mechanisms to control organisational IT security.
Pass, Merit & Distinction
P5
P6
M3
Descripts
M4
D2
LO4. Manage organisational security.
Pass, Merit & Distinction
Descripts
Grade:
P7
P8
M5
D3
Assessor Signature:
Date:
Assessor Signature:
Date:
Resubmission Feedback:
Grade:
Internal Verifier’s Comments:
Signature & Date:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Feedback: Student to Assessor
Sandun Blazon Lanka Poulier
Unit - 05
011362
Assessor
signature
Date
Student signature
Date
Sandun Blazon Lanka Poulier
Unit - 05
011362
Pearson
Higher Nationals in
Computing
Unit 5 : Security
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and be sure to fill the details correctly.
2. This entire brief should be attached in first before you start answering.
Sandun Blazon Lanka Poulier
Unit - 05
011362
3. All the assignments should prepare using word processing software.
4. All the assignments should print in A4 sized paper, and make sure to only use one side printing.
5. Allow 1” margin on each side of the paper. But on the left side you will need to leave room for
binging.
Word Processing Rules
1. Use a font type that will make easy for your examiner to read. The font size should be 12 point,
and should be in the style of Time New Roman.
2. Use 1.5 line word-processing. Left justify all paragraphs.
3. Ensure that all headings are consistent in terms of size and font style.
4. Use footer function on the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help edit your
assignment.
Important Points:
1. Check carefully the hand in date and the instructions given with the assignment. Late submissions
will not be accepted.
2. Ensure that you give yourself enough time to complete the assignment by the due date.
3. Don’t leave things such as printing to the last minute – excuses of this nature will not be accepted
for failure to hand in the work on time.
4. You must take responsibility for managing your own time effectively.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade being given.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then
be asked to complete an alternative assignment.
8. Take great care that if you use other people’s work or ideas in your assignment, you properly
reference them, using the HARVARD referencing system, in you text and any bibliography,
otherwise you may be guilty of plagiarism.
9. If you are caught plagiarising you could have your grade reduced to A REFERRAL or at worst you
could be excluded from the course.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct way. I further understand what it means to copy
another’s work.
1. I know that plagiarism is a punishable offence because it constitutes theft.
2. I understand the plagiarism and copying policy of the Edexcel UK.
3. I know what the consequences will be if I plagiaries or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspects of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Edexcel UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the attached.
Student’s Signature:
(Provide E-mail ID)
Date: 2020/10/15
(Provide Submission Date)
Poulier123456@gmail.com
Assignment Brief
Sandun Blazon Lanka Poulier
Unit - 05
011362
Student Name /ID Number
Sandun Poulier/ KAN-A - 011362
Unit Number and Title
Unit 5- Security
Academic Year
2019/2020
Unit Tutor
Assignment Title
EMC Cloud Solutions
Issue Date
Submission Date
15/10/2020
IV Name & Date
Submission Format:
The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs
and subsections as appropriate, and all work must be supported with research and referenced using the
Harvard referencing system. Please also provide an end list of references using the Harvard referencing
system.
Unit Learning Outcomes:
LO1 Assess risks to IT security.
LO2 Describe IT security solutions.
LO3 Review mechanisms to control organisational IT security.
LO4 Manage organisational security.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Assignment Brief and Guidance:
Sandun Blazon Lanka Poulier
Unit - 05
011362
EMC Cloud Solutions is reputed as the nation’s most reliable Cloud solution provider in Sri Lanka.
A number of high profile businesses in Sri Lanka including Esoft Metro Camps network, SME Bank Sri
Lanka and WEEFM are facilitated by EMC Cloud Solutions. EMC Cloud provides nearly 500 of its
customers with SaaS, PaaS & IaaS solutions with high capacity compute and storage options. Also EMC
is a selected contractor for Sri Lanka, The Ministry of Defense for hosting government and defense
systems.
EMC’s central data center facility is located at Colombo Sri Lanka along with its corporate head-office in
Bambalapitiya. Their premises at Bambalapitiya is a six story building with the 1st floor dedicated to sales
and customer services equipped with public wifi facility. Second-floor hosts HR, Finance and Training &
Development departments and the third-floor hosts boardroom and offices for senior executives along
with the IT and Data center department. Floor 4,5,6 hosts computer servers which make up the data
center.
With the rapid growth of information technology in Kandy area in recent years, EMC seeks opportunity to
extend its services to Kandy, Sri Lanka. As of yet, the organization still considers the nature of such
extension with what to implement, where is the suitable location and other essential options such as
security are actually being discussed.
You are hired by the management of EMC Solutions as a Security Expert to evaluate the security-related
specifics of its present system and provide recommendations on security and reliability related
improvements of its present system as well as to plan the establishment of the extension on a solid
security foundation.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Activity 01
Assuming the role of External Security Consultant, you need to compile a report focusing on following
elements to the board of EMC Cloud Solutions;
1.1 Identify types of security risks EMC Cloud is subject to, in its present setup and the impact, such
issues would create on the business itself.
1.2 Develop and describe security procedures for EMC Cloud to minimize the impact of issues discussed
in section (1.1) by assessing and treating the risks.
Activity 02
2.1 Discuss how EMC Cloud and its clients will be impacted by improper/ incorrect configurations which
are applicable to firewalls and VPN solutions.
2.2 Explain how following technologies would benefit EMC Cloud and its Clients by facilitating a
‘trusted network’. (Support your answer with suitable illustrations).
=[;]’t\[i) DMZ
ii) Static IP
iii)NAT
2.3 Discuss the benefits of implementing network monitoring systems.
Activity 03
3.1 Formulate a suitable risk assessment procedure for EMC Cloud solutions to safeguard itself and its
clients.
3.2 Explain the mandatory data protection laws and procedures which will be applied to data storage
solutions provided by EMC Cloud. You may also highlight on ISO 3100 risk management methodology.
3.3 Comment on the topic, ‘IT Security & Organizational Policy’
Sandun Blazon Lanka Poulier
Unit - 05
011362
Activity 04
4.1 Develop a security policy for EMC Cloud to minimize exploitations and misuses while evaluating the
suitability of the tools used in an organizational policy.
4.2 Develop and present a disaster recovery plan for EMC Cloud for its all venues to ensure maximum
uptime for its customers (Student should produce a PowerPoint-based presentation which illustrates the
recovery plan within 15 minutes of time including justifications and reasons for decisions and options
used).
4.3 ‘Creditors, directors, employees, government and its agencies, owners /
shareholders, suppliers, unions, and the other parties the business draws its resources’ are the main
branches of any organization. Discuss the role of these groups to implement security audit
recommendations for the organization.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Table of Contents
Table of figures ............................................................................................................................. 16
Acknowledgement ........................................................................................................................ 17
Task 1 ............................................................................................................................................ 18
1.1 Identify types of security risks EMC Cloud is subject to, in its present setup and the
impact, such issues would create on the business itself. ........................................................... 18
1.1.2 EMC cloud solution ..................................................................................................... 18
1.2 Develop and describe security procedures for EMC Cloud to minimize the impact of issues
discussed in section (1.1) by assessing and treating the risks. .................................................. 19
1.2.1 Security procedures for EMC Cloud to minimize the impact of issues by assessing and
treating the risks. ................................................................................................................... 19
Task 2 ............................................................................................................................................ 20
2.1 Discuss how EMC Cloud and its clients will be impacted by improper/ incorrect
configurations which are applicable to firewalls and VPN solutions. ...................................... 20
2.1.1 EMC Cloud and its clients will be impacted by improper/ incorrect configurations
which are applicable to firewalls and VPN solutions. .......................................................... 20
2.2 Explain how following technologies would benefit EMC Cloud and its Clients by
facilitating a ‘trusted network’. (Support your answer with suitable illustrations). (1. DMZ 2.
Static IP 3. NAT) ...................................................................................................................... 23
2.2.1 DMZ zone .................................................................................................................... 23
2.2.2 Trusted Networks ......................................................................................................... 26
2.2.3 Static IP ........................................................................................................................ 26
2.2.4 NAT ............................................................................................................................. 27
2.3 Discuss the benefits of implementing network monitoring systems. ................................. 31
Task 3 ............................................................................................................................................ 34
3.1 Formulate a suitable risk assessment procedure for EMC Cloud solutions to safeguard
itself and its clients.................................................................................................................... 34
3.2 Explain the mandatory data protection laws and procedures which will be applied to data
storage solutions provided by EMC Cloud. You may also highlight on ISO 3100 risk
management methodology. ....................................................................................................... 36
3.3 Comment on the topic, ‘IT Security & Organizational Policy’ .......................................... 37
3.3.1 IT security policy ......................................................................................................... 37
3.3.2 Organizational Policy................................................................................................... 38
Task 4 ............................................................................................................................................ 39
Sandun Blazon Lanka Poulier
Unit - 05
011362
4.1 Develop a security policy for EMC Cloud to minimize exploitations and misuses while
evaluating the suitability of the tools used in an organizational policy. ................................... 39
4.2 Develop and present a disaster recovery plan for EMC Cloud for its all venues to ensure
maximum uptime for its customers (Student should produce a PowerPoint-based presentation
which illustrates the recovery plan within 15 minutes of time including justifications and
reasons for decisions and options used). ................................................................................... 40
4.3 ‘Creditors, directors, employees, government and its agencies, owners /
shareholders, suppliers, unions, and the other parties the business draws its resources’ are the
main branches of any organization. Discuss the role of these groups to implement security
audit recommendations for the organization............................................................................. 40
4.3.1 Implement security audit recommendations for the organization................................ 41
Appendix ....................................................................................................................................... 43
Gantt chart ..................................................................................................................................... 46
Sandun Blazon Lanka Poulier
Unit - 05
011362
Table of figures
Figure 1: CIA triangle ................................................................................................................ 19
Figure 2: DMZ (demilitarized zone) ......................................................................................... 24
Figure 3: Example of a DMZ zone ............................................................................................ 25
Figure 4: setting up Static IP ..................................................................................................... 26
Figure 5: network Address Translation (NAT) ....................................................................... 29
Figure 6: What is PAT - Port Address Translation (NAT Overload) .................................... 30
Sandun Blazon Lanka Poulier
Unit - 05
011362
Acknowledgement
I’ve taken several efforts in this project to make it a success. However, it would not have been
possible without either the support or help of any individual. I would like give my sincere thanks
to all of the ones who helped and supported me in this project.
I highly thank my lecturer Mr. Sudesh for his guidance and endless supervision as well as for
providing necessary information regarding the project and for his sustenance in completing the
project.
And also I would like to express my gratitude towards my parents for their cooperation,
encouragement, which was a great help for me to complete this project. Moreover, my friends
deserve the thanks and appreciations in developing the project and also to the people who have
willingly helped me.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Task 1
1.1 Identify types of security risks EMC Cloud is subject to, in its present
setup and the impact, such issues would create on the business itself.
1.1.2 EMC cloud solution
Since the EMC’s central data center facility is located at Colombo Sri Lanka along with its
corporate head-office in Bambalapitiya it seeks opportunity to extend its services to Kandy, Sri
Lanka. Being a security expert in a company like cloud solution there we come across numerous
threats and risk. According to the EMC cloud solution there we find numerous risks as follows,
Due to malicious attacks by the service providers EMC cloud service might be loss or even natural
disasters or data deletions could occur or happen. Accordingly, a solution doesn’t have a rescue
plan, long loosing sensitive information could be a huge loss for the solution. Since there are pretty
amount of servers in the EMC cloud solution heat on the server’s causes to control the temperature
should be low, so that the air cooler should be working well. Because of the climate in Sri Lanka
power cuts happen frequently not only power cuts but also electric maintenance, voltage problems
and etc. may happen which is a threat to the company.
Moreover, a computer security is the protection of computer systems from theft or damage
to their hardware, software or even electronic data, as well as from trouble or misdirection of the
services they provide. As human beings we could not control the natural disasters. Nature risks or
threats occurs naturally. Disasters like lightning floods, cyclone, storms and etc. might occur and
could not be controlled by human beings. But we can minimize them.
EMC cloud which already has a public Wi-Fi facility might be a risk to the solution as it is
the public people might connect their devices to the EMC’s public Wi-Fi so that the hackers could
easily access through the public Wi-Fi and this could lead to lose the sensational information’s or
the company records hacked. If there is no proper storage system in a company like EMC cloud
which is a backup, due to any physical threats like natural disasters, computer crashes, or even
deleted records and documents and sensational details may cause either a great loss or damage to
the company.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Figure 1: CIA triangle
Confidentiality, integrity and availability, also known as the CIA triad, is a model designed
to guide policies for information security within an organization. The model is also sometimes
referred to as the AIC triad (availability, integrity and confidentiality) to avoid confusion with
the Central Intelligence Agency. The elements of the triad are considered the three most crucial
components of security (Rouse, 2019).
1.2 Develop and describe security procedures for EMC Cloud to minimize the
impact of issues discussed in section (1.1) by assessing and treating the risks.
1.2.1 Security procedures for EMC Cloud to minimize the impact of issues by assessing and
treating the risks.
To minimize the problems and issues from the natural disasters (said accordingly in above activity
1.1) a proper backup plan should be arranged. The disaster recovery plan covers will manage and
how we will do it. All these devices should be moved for a place where natural disasters won’t
affect these like flood for example (keys, routers, firewalls, servers) and low cost (computers and
printers) to make the most expensive. If EMC cloud designed a server room or data center, it’s
good for keeping these devices and staffs in a part of EMC cloud building, which will not be
Sandun Blazon Lanka Poulier
Unit - 05
011362
affected by the flood which occurs at the ground level, which will be protected and be safe to move
those devices and things to that relevant server room or data room if flood occurs suddenly.
Create and manage good documentation for the networks and resources used by large IT
departments. It means that there are strictly controlled entries for passwords and access points, it’s
better to Use IT tools that allow you to figure out unseen internet access pass through network
(malware or hackers access) and warns to detect possible tamper events.
In Sri Lanka generally power cuts happening as usual because of climate change, electricity
maintenance, voltage problems etc. so it is required to have many UPS in the server farm with the
goal that the work done won't be lost when the current is no more. Staff individuals ought to
dependably be checked deliberately utilizing legitimate bosses, CCTV cameras and just approved
people ought to be permitted to enter particular spots of the server farm. The idea that many
security managers are new is finding an internal threat and encouraging people to use or encourage
them. Understanding these behavioral components is an important tool, especially against an IT
sabotage of EMC cloud. High Digital CCTV cameras should be fixed on every area where there
is very important Data, especially a camera should be fixed in the server room, 24 hours’ following
should be existing and the clips should be squared whenever it is possible.
Task 2
2.1 Discuss how EMC Cloud and its clients will be impacted by improper/
incorrect configurations which are applicable to firewalls and VPN solutions.
2.1.1 EMC Cloud and its clients will be impacted by improper/ incorrect configurations
which are applicable to firewalls and VPN solutions.
Misconfigured Firewall
“A firewall is a network security system designed to prevent unauthorized access to or from a
private network. Firewalls can be implemented as both hardware and software, or a combination
of both” (Beal, 2019).
A firewall could be either a software or a hardware which is used to safeguard the security of the
private network. What firewall does is blocks the unauthorized users from private network which
is connected to the web.
Moreover, firewall Configuration is more important in EMC cloud solution; misconfiguration
could cause any level claim mound from code. If EMC company firewall is misconfigured by
gratuitous ports either open or allowing unofficial users to connect the network can cause the
server control to an unauthorized user, it’ll gilt up on closing the server farm. ACL dogmas
should be drilled to prevent unauthorized access to the EMC network.
Sandun Blazon Lanka Poulier
Unit - 05
011362
•
Benefits of using firewall
How Firewalls Work: Firewalls use rules to examine network packets as they pass through a
particular location on a network. If a packet does not contravene any of the firewall's rules, the
firewall will allow the packet through to its destination. However, a packet that breaks a firewall
rule -- for example, by originating from a host that has been blocked from sending traffic to the
network -- will be discarded.
Security Benefits: Firewalls provide markedly increased security for computers and other
devices, especially on networks that are connected to the Internet. Without firewall software, it
would be very easy for attackers to send malicious programs to your computer over a network,
drastically increasing the load on your computer's anti-virus and anti-malware programs. With a
firewall in place, however, you can dictate exactly what the computers on your network are able
to send and receive from the outside world, helping you to cut threats off at their source.
Monitoring With Firewalls: Firewall logging is the process of monitoring network traffic
through a firewall. By definition, firewalls need to examine network packets closely as those
packets pass by. Some firewalls can compile logs using the information that they gain from these
packets, noting parameters such as the packet's destination, source and size. These logs can then
be used to help determine network conditions, including which areas of the network are busiest
and which network applications consume the most data.
Enforcing Policies: Many networks have policies regarding which users can access data. For
example, a school would likely prevent all of its computers from accessing adult content, while a
home user might limit the amount of time that her children could use the Internet. Firewalls
allow users to actively enforce these policies by creating specific rules. As such, the school
might create a firewall rule blocking all content containing certain keywords, while the home
user might create a rule blocking all Internet traffic from her children's computer user accounts,
except at specific times.
Why are firewall used
Need of Firewall:
As there is always an increased malware threat targeting any system, use of security software
such as antivirus and firewall is always very essential. Firewall secures your system from
malware attackers who focus on hacking into your system, aiming to steal your user personal
information such as account details, bank data etc. The best firewall software always give
complete protection against these attacks, thereby helping to keep your system 100% problem
free.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Misconfigured VPN
“A VPN, or Virtual Private Network, allows you to create a secure connection to another
network over the Internet. VPNs can be used to access region-restricted websites, shield your
browsing activity from prying eyes on public Wi-Fi, and more.
VPNs essentially forward all your network traffic to the network, which is where the benefits –
like accessing local network resources remotely and bypassing Internet censorship – all come
from. Most operating systems have integrated VPN support” (chrisbhoffman, 2019).
In other words, VPN is a private network which is built on a public groundwork. Security
appliances, example: encryption, through encryption it allows VPN users to strongly access a
network through different locations through a telecommunication network, such as the internet.
Some VPN such as Prompt VPN can act as proxy in which the proxy consents view webs
namelessly from everyplace the user wants
•
Benefits of using VPN
Enhanced security: When you connect to the network through a VPN, the data is kept secure
and encrypted. In this way, the information is away from the hackers’ eyes.
Remote control: In the case of a company, the great advantage of having a VPN is that the
information can be accessed remotely even from home or from any other place. That’s why a
VPN can increase productivity within a company.
Share files: A VPN service can be used if you have a group that needs to share data for an
extended period.
Online anonymity: Through a VPN you can browse the web in complete anonymity. Compared
to hide IP software or web proxies, the advantage of a VPN service is that it allows you to access
both web applications and websites in complete anonymity.
Unblock websites & bypass filters: VPNs are great for accessing blocked websites or for
bypassing Internet filters. This is why there is an increased number of VPN services used in
countries where Internet censorship is applied.
Change the IP address: If you need an IP address from another country, then a VPN can
provide you this.
Better performance: Bandwidth and efficiency of the network can generally be increased once
a VPN solution is implemented.
Reduce costs: Once a VPN network is created, the maintenance cost is very low. More than that,
if you opt for a service provider, the network setup and surveillance is no more a concern.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Why are VPN used
Use Public or Hotel Wi-Fi securely: Public Wi-Fi offers no encryption security to its users, and
your signals are broadcast for anyone savvy enough to eavesdrop, therefore some people use
VPNs at Wi-Fi hotspots to prevent snoopers from collecting private information. Generally, the
most effective way to keep your data from entering the wrong hands is by using a VPN service
which makes all Internet use totally private and secure.
Secure Communication between Sites: Many businesses today have branch offices, and
connect these branches to the main office over the Internet using a site-to-site VPN connection.
For example, a businesses can enable workers with laptops on the road or at home to connect to
the company network as if they were sat at a desk in the office. A company that has offices in
two locations can connect them using a VPN across the internet so there appears to be one
network. Linking remote sites with a main office lets users send and receive information via a
secure connection. Employees can use file servers and printers which are not physically in the
same office.
Bypass the Web Censorship and Content Surveillance: Some countries put up firewalls to
restrict what their residents see, hear, and share with other people within and beyond their
borders. Connecting to a VPN server will enable you to 'tunnel out' of the censorship restrictions
and access the full World Wide Web.
2.2 Explain how following technologies would benefit EMC Cloud and its
Clients by facilitating a ‘trusted network’. (Support your answer with suitable
illustrations). (1. DMZ 2. Static IP 3. NAT)
2.2.1 DMZ zone
Pronounced as separate letters, DMZ is short for demilitarized zone, a computer or small sub
network that sits between a trusted internal network, such as a corporate private LAN, and an
untrusted external network, such as the public Internet.
Typically, the DMZ contains devices accessible to Internet traffic, such as Web (HTTP )
servers, FTP servers, SMTP (e-mail) servers and DNS servers.
The phrase demilitarized zone comes from military use, meaning a buffer area between two
enemies (Webopedia Staff, 2019).
Sandun Blazon Lanka Poulier
Unit - 05
011362
Figure 2: DMZ (demilitarized zone)
If an organized threat actor is able to get through the initial firewall, they must then gain
unsanctioned admittance to those services earlier they can do any mutilation, and those systems
are likely to be cynical in contradiction of such attacks.
DMZ networks have been an important part of enterprise network security for almost as long as
firewalls have been in use and, in large part, for similar reasons firewalls are positioned to
protect sensitive organizational systems and resources.
Where is DMZ useful
In a home network, computers and other devices typically are configured into a local area
network connected to the internet using a broadband router. The router serves as a firewall,
selectively filtering traffic from the outside to help ensure only legitimate messages pass through.
A DMZ divides such a network into two parts by taking one or more devices inside the firewall
and moving them to the outside. This configuration better protects the inside devices from
possible attacks by the outside (and vice versa).
A DMZ is useful in homes when the network is running a server. The server could be set up in a
DMZ so that internet users could reach it through its public IP address, and the rest of the home
network was protected from attacks in cases where the server was compromised. Years ago,
before cloud services became widely available and popular, people more commonly ran
Web, VoIP, or file servers from their homes and DMZs made more sense.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Figure 3: Example of a DMZ zone
Purpose of a DMZ
The DMZ Network exists to protect the hosts most vulnerable to attack. These hosts usually
involve services that extend to users outside of the local area network, the most common
examples being email, web servers, and DNS servers. Because of the increased potential for
attack, they are placed into the monitored sub network to help protect the rest of the network if
they become compromised.
Hosts in the DMZ have tightly controlled access permissions to other services within the internal
network, because the data passed through the DMZ is not as secure. On top of that,
communications between hosts in the DMZ and the external network are also restricted to help
increase the protected border zone. This allows hosts in the protected network to interact with the
internal and external network, while the firewall separates and manages all traffic shared
between the DMZ and the internal network. Typically, an additional firewall will be responsible
for protecting the DMZ from exposure to everything on the external network.
All services accessible to users on communicating from an external network can and should be
placed in the DMZ, if one is used. The most common services are:
•
Web servers: Web servers responsible for maintaining communication with an internal
database server may need to be placed into a DMZ. This helps ensure the safety of the
internal database, which is often storing sensitive information. The web servers can then
Sandun Blazon Lanka Poulier
Unit - 05
011362
•
•
interact with internal database server through an application firewall or directly, while
still falling under the umbrella of the DMZ protections.
Mail servers: individual email messages, as well as the user database built to store login
credentials and personal messages, are usually stored on servers without direct access to
the internet. Therefore, an email server will be built or placed inside the DMZ in order to
interact with and access the email database without directly exposing it to potentially
harmful traffic.
FTP servers: These can host critical content on an organization's site, and allow direct
interaction with files. Therefore, an FTP server should always be partially isolated from
critical internal systems.
2.2.2 Trusted Networks
A trusted network is the one which is under the control of the network manager or the network
administrator.
Basically, this is the network that a network admin tries to protect and defines the security
parameters for the same. So, it can also be said that the trusted networks are within the security
perimeter.
2.2.3 Static IP
A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by
an Internet service provider (ISP) to be its permanent address on the Internet. Computers use IP
addresses to locate and talk to each other on the Internet, much the same way people use phone
numbers to locate and talk to one another on the telephone. When you want to visit whatis.com,
your computer asks a domain name system (DNS) server (think telephone information operator)
for the correct dotted quad number (think phone number) for whatis.com and your computer uses
the answer it receives to connect to the whatis.com server (Rouse, 2019).
Figure 4: setting up Static IP
Sandun Blazon Lanka Poulier
Unit - 05
011362
Advantages of static IP
•
•
•
Stability – In case of claims such as authenticated services on web servers and file
downloads the connection should be stable. Accordingly, in static IP a small disturbance
in the connection usually does not terminate the packet exchange with the service.
Hosting- Meanwhile there is no change of IP address, this is suitable for applications
which use voice over Internet protocol (VOIP), gaming applications, and virtual private
network (VPN).
Proffered address for servers – Static IP addresses id ideal if the computer acts as a
server. The reason is it gives file server relatively faster file uploads and downloads.
Disadvantages of static IP
•
•
Security – Static IP address could be a security risk as the IP address is constant. There is
a greater chance of hackling the website. Also you cannot easily change the Static IP
once it has been hacked.
Transfer protocol sites. So the servers have to be on all the time to host these functions.
The cost of constantly running a server is exorbitant.
Configuration – The process to set a static IP is manual and relatively complex infrequently,
external software is required for this purpose. Also several consumer level ISPs lack support for
static IPs.
2.2.4 NAT
NAT is short for Network Address Translation. NAT is an Internet standard that enables a localarea network (LAN) to use one set of IP addresses for internal traffic and a second set of
addresses for external traffic. A NAT box located where the LAN meets the Internet makes all
necessary IP address translations ( Beal, 2019).
The Purpose of NAT
NAT serves three main purposes:
•
•
•
provides a type of firewall by hiding internal IP addresses
Enables a company to use more internal IP addresses. Since they're used internally only,
there's no possibility of conflict with IP addresses used by other companies and
organizations.
Allows a company to combine multiple ISDN connections into a single Internet
connection.
Sandun Blazon Lanka Poulier
Unit - 05
011362
However, NAT have some advantages as well as disadvantages. Nat could be used with routable
which means public IP addresses, as well as with private IP addresses. Moreover, the chance
you’ll use a public IP addresses in your NAT application is small.
In most cases, NAT is used when you don’t have enough public IPs allotted for a network and to
protect some hosts on network for requests originating from the internet which is called NAT
overloaded.
Using NAT has some benefits like,
Increasing the flexibility and the reliability of connections to the public network by
implementing compound pools, backup pools, as well as load-balancing pools. Getting an extra
layer of network security. Hosts inside a Nat network which aren’t reliable by hosts on other
networks unless the user wants to.
NAT has some drawbacks too,
End to end IP traceability can be lost. It there is in need of troubleshooting a network from a
remote site, it would be more difficult and sometimes even impossible. Services that requires
TCP or UDP connection initiation from the outside can also be affected and sometimes not
usable at all. Using tunneling protocols, such as IPsec, can also be a more complicated since
NAT modifies values in the headers that interfere with integrity checks done by IPsec and other
tunneling protocols.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Figure 5: network Address Translation (NAT)
Disadvantages of NAT
•
•
•
NAT is a processor and memory resource consuming technology.
NAT may cause delay in IPV4 communication.
It causes loss of end device IP traceability.
Advantages of NAT
•
•
•
It can prevent the depletion of IPV4 addresses.
It can provide an additional layer of security by making the original source and
destination addresses hidden.
It provides flexibility when connecting to the public internet which I had explained
briefly above.
2.2.4.1 PAT
Port Address Translation (PAT), is an extension to network address translation (NAT) that
permits multiple devices on a local area network (LAN) to be mapped to a single public IP
address. The goal of PAT is to conserve IP addresses. In other words, PAT is a feature of
network device that translates communications made between hosts on a private network and
hosts on public network. It allows a single public IP address to be used by many hosts on the
Sandun Blazon Lanka Poulier
Unit - 05
011362
private network, which is usually a LAN. PAT is informally called router; gateway is more
appropriate. It also device sits at the network perimeter where one side connects the external
network, usually the public internet, and on the other side an internet network using private IP
addressing. Moreover, PAT operation is typically transparent to both the internal and external
hosts.
Figure 6: What is PAT - Port Address Translation (NAT Overload)
The joint relationship between NAT and PAT within the network
As we all know there are three types of NAT namely, Static, dynamic, and overloading which is
PAT. Static NAT is defined as one to one address mapping. Dynamic NAT addresses are picked
or chosen from a pool. NAT overloading which is the PAT allows to map many addresses which
is inside to one outside address. IP NAT translates to command and display the translation table
and verifies the translation which is occurred. To determine the current translation entry is used,
IP Nat is used.
Advantages
•
•
Numerous internal hosts can share a single IP address for communication, thus
conserving precious IP addresses.
Hosts on the private network which don’t have to expose their private IP addresses to the
public network, making attacks from the public network less likely.
Disadvantage
•
An organization using PAT and a Single IP address cannot easily run more than one of
the same type of public service behind PAT.
Sandun Blazon Lanka Poulier
Unit - 05
011362
•
If many hosts on the private network make many connections to the public network, the
PAT device may not have sufficient room in its internal table to keep track of the
connections or it may simple run out of un-used ports.
2.3 Discuss the benefits of implementing network monitoring systems.
Network monitoring
Network monitoring is the practice of consistently overseeing a computer network for any
failures or deficiencies to ensure continued network performance. For example, network
monitoring will monitor the conditions of network components such
as routers, servers and firewalls. If a slowing or failing component is detected, the network
monitoring software in use will notify network administrators of the issue; avoiding a network
outage. Likewise, if a performance bottleneck is detected, the network monitoring software will
notify administrators (Rouse, 2019).
Benefits of implementing network monitoring system
Network monitoring is completely necessary for a solution like EMC cloud. The whole purpose
of network monitoring is to monitor the computer networks usage and performance, and check
for slow of falling systems. Then the system will notify the network administrator of any
performance issues or outages with some kind of an alarm or an email. This can save a lot of
money and may also reduce many problems. Moreover, it is the best possible way to ensure the
solution is operating properly. One of the most important parts of a network monitoring is
keeping information secured. It will keep track of almost everything and alerts the network
administrator of any issues before it turns to a big problem. Accordingly, troubleshooting
abilities is another great advantage. Can save a lot of time trying to analyze what is wrong.
Below are some examples or tools which ensures the network continuously tracked and
monitored all times.
1. Zabbix
2. PRTG
3. IPS/IDS
•
Protecting the network against attackers. Network monitoring systems are able to
identify suspicious traffic, thereby empowering owners to act fast. A network monitoring
service is able to provide a broad overview of an SMB's entire IT infrastructure, so that
nothing is missed. Today, exploits are more sophisticated and advanced, and are able to
target a system in a variety of ways. Monitoring antivirus and firewall solutions
separately may leave security gaps.
Sandun Blazon Lanka Poulier
Unit - 05
011362
•
Keeping informed without in-house staff. A network monitoring service will send
alerts and information to an SMB owner as issues arise. Otherwise, an SMB may need to
either attempt to monitor their network security themselves or hire a full-time IT
employee -- which could be very costly. Data breaches can be more damaging and more
expensive the longer they go without being detected.
•
Keeping informed without in-house staff. A network monitoring service will send
alerts and information to an SMB owner as issues arise. Otherwise, an SMB may need to
either attempt to monitor their network security themselves or hire a full-time IT
employee -- which could be very costly. Data breaches can be more damaging and more
expensive the longer they go without being detected.
Optimizing and monitoring your network. Many small business owners are aimed
towards rapid growth. This growth cannot be possible if parts of their IT infrastructure
are over-burdened or slowed. Network monitoring services will map out the
infrastructure of a small business, showing an SMB owner areas of improvement and any
issues that currently need to be addressed.
•
•
Remotely connecting to your infrastructure. Network monitoring services are able to
be accessed from anywhere in the world, allowing an SMB owner to still conduct
business whether they are at home, at the office, or traveling abroad. This can be
absolutely essential when you are working with a small amount of staff members or when
you simply need to complete tasks on your own.
Advantages of network monitoring include:
•
•
•
•
•
•
The ability to tell if a network component, such a server, fails as soon as it happens
through notifications.
Network administrators can more quickly address network issues.
Makes identifying security threats easier.
Easy to tell when a network component needs replacing or tuning.
Automatic configuration of network devices.
Allows users to visualize the performance of their IT infrastructure.
Disadvantages of network monitoring include:
•
•
•
•
Purchasing the network wiring and file servers can be high-priced.
Handling a substantial network is complicated, requires a network supervisor and
training generally needs to be employed.
When the file server reduces the files to the file server become inaccessible. Electronic
Mail might still function if it's on a separate server.
Viruses can spread to other computers throughout a pc network.
Sandun Blazon Lanka Poulier
Unit - 05
011362
•
There's a danger of hacking, especially with wide-area networks. Security methods are
necessary to prevent such exploitation, e.g. a firewall.
Why are networking monitoring used
•
Stay ahead of outages
What causes IT outages? Human error, configuration issues, and environmental factors
can all contribute. Implementing network monitoring is one of the most basic and simple
ways to prevent these outages from happening in the first place.
Network monitoring gives you the visibility you need to stay one step ahead of potential
issues. By showing live network performance data in an easy-to-read interface, network
monitoring software helps you identify outages that could cause bottlenecks.
•
Fix issues faster
In a down situation, time is money. Network monitoring makes problem-solving easier
and faster for time-strapped network professionals.
Whether you're dealing with a configuration error or an abnormal traffic fluctuation,
network monitoring software helps you get to the bottom of issues once and for all. Live
network maps lead you to the origin of problems, and status windows give you
performance metrics over time.
Also, network automation tools help you go one step further. Not only can you identify
problems via network monitoring, but you can fix them automatically, without having to
get a person involved.
•
Gain immediate ROI
IT teams face heavy workloads and increasingly complex projects, often without the
ideal time, staff, or budget needed to complete them. The right network monitoring tool
can deliver immediate ROI. Without the need to manually dig into network
performance, staff have time back in their day to work on more critical projects. Seeing
the source of issues cuts down on tedious troubleshooting time. And getting ahead of IT
outages reduces the costs of outages to your organization.
• Manage growing, changing networks
With technology innovation and the rise in connected devices, today's IT environments
are growing in size. The number of Internet-connected things is expected to reach 20.4
billion by 2020, according to one Gartner report—and while most of those devices are
consumer-focused, 3.1 billion of those total connected things will be business-related in
2017. Whether that's internet-enabled sensors, wireless devices, or cloud technologies,
all this equipment needs to be monitored continuously for major fluctuations and
suspicious activity.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Networks are also growing in complexity. Whether you're dealing with cloud
migrations or IPv6 transitions, you need flexible, reliable tools to help you monitor all
your IP assets and ensure smooth performance—even in the midst of change.
•
Identify security threats
When you don't have budget for intrusion detection software, but still want a tier 1
method to help protect against data breaches, network monitoring can help secure your
business-critical data.
A network monitoring tool can provide that first level of security. The biggest benefit you
get is a picture of what "normal" performance looks like for your organization, making it
easy to spot anything out of the ordinary—whether that's a spike in traffic levels or an
unfamiliar device that's connected to your network. By drilling in to figure out when and
on what device an event occurred, you're able to take a proactive approach to network
security.
Task 3
3.1 Formulate a suitable risk assessment procedure for EMC Cloud solutions
to safeguard itself and its clients.
A security risk assessment classifies, evaluates, and implements key security controls in
applications. It also emphases on preventing application security defects and vulnerabilities. And
also it supports managers in making informed source allocation, tooling and security control
implementation decisions.
EMC cloud solution generalize assessments when experiencing budget or time limitations.
However, generalized assessments don’t necessarily provide the detailed mappings between
assets, associated threats, identified risks, impact, and moderating controls.
According to the EMC cloud solution it is a must to have an exceptionally solid firewall which is
extremely ensured by important data which is given to the clients and administrations. On the off
chance the firewall is unimportant, it also can cause numerous issues that could prompt the
server farm closing down. Moreover, unapproved clients can get to the EMC cloud solution and
cannot change or include undesirable information. The database can be meritoriously hacked.
Due to that the data center will be under the control of anonymous network researchers or
hackers.
Sandun Blazon Lanka Poulier
Unit - 05
011362
There are 6 steps of a successful security assessment model.
•
•
•
•
•
•
Identification governs all critical assets of the technology arrangement. It is the ability to
identify uniquely a user of a specific system or an application that is running the system. In
other words, detecting and solving sensitive data that is created, stored, or eve transmitted
by the assets which creates a risk profile for each.
Establishing a risk management framework, that is the rules which are governing the risks
to identify which a risk ownership is assigned. The risks which affect the confidentiality,
integrity and availability of the information and also the method of calculating the estimated
damage of each scenario and the likelihood of it occurring.
Identifying the risks that can affect the confidentiality, integrity and availability of
information is the most time-consuming part of the risk assessment process.
Analyze the risk, threats and vulnerabilities that apply to each asset must be identified.
Evaluate risks, each risk against predetermined levels of acceptable risk must be weighed,
and determine which risks needed to address and which ones are ignored.
Selecting risk treatment opinions, accordingly there are four ways to treat risk:
= Avoid the risk by eliminating it entirely.
= Modify the risk by applying security controls.
= Share the risk with a third party.
= Retain the risk.
Observation of Audit log
The user which has a run user activity across the Audit logs cluster. It’s designed to control and
monitor access information in the company as a security or compliance program of any
company. The need of a enterprise buyer for an audit plan for the entire activity account.
Auditing is used to start account activity during a suspicious activity or even review. Most
probably the target content isn’t logged in but the state is used.
Honeypots
The eventual computer system that grounds hackers or monitors unfamiliar or even new hacker
modes is the honeypots. Honeypots will work, it helps to identify the hacker targets. They aren’t
necessarily the identification of hackers. Honeypot developers are often interested in penetrating
the minds of the hackers and designs a safer system and teaches their experiences.
Sandun Blazon Lanka Poulier
Unit - 05
011362
3.2 Explain the mandatory data protection laws and procedures which will be
applied to data storage solutions provided by EMC Cloud. You may also
highlight on ISO 3100 risk management methodology.
Risk which affects organizations has consequences in terms of economic performance and
professional reputation, as well as environmental safety and societal outcomes. Therefore,
managing risk effectively helps organizations to perform well in an environment full of
uncertainty. Using ISO 31000 can help organizations increase the likelihood of achieving aims,
improve the identification of opportunities and threats and effectively allocate and use resources
for risk treatment.
However, ISO 31000 cannot be used for certification purposes, but it does provide guidance for
internal or external audit programs. Organization use it could compare their risk management
practices with an internationally recognized benchmark, which provides principles for effective
management and corporate governance.
ISO 31000
ISO 31000 is an international standard published in 2009 that provides principles and
guidelines for effective risk management. It outlines a generic approach to risk management,
which can be applied to different types of risks (financial, safety, project risks) and used by any
type of organization. The standard provides a uniform vocabulary and concepts for discussing
risk management. It provides guidelines and principles that can help to undertake a critical
review of your organization’s risk management process.
The standard does not provide detailed instructions or requirements on how to manage specific
risks, nor any advice related to a specific application domain; it remains at a generic level.
Relative to older standards on risk management, the 31000 standard innovates in several areas:
•
•
•
•
it provides a new definition of risk as the effect of uncertainty on the possibility of
achieving the organization’s objectives, highlighting the importance of defining
objectives before attempting to control risks, and emphasizing the role of uncertainty
it introduces the (sometimes controversial) notion of risk appetite, or the level of risk
which the organization accepts to take on in return for expected value
it defines a risk management framework with different organizational procedures, roles
and responsibilities in the management of risks
it outlines a management philosophy where risk management is seen as an integral part of
strategic decision-making and the management of change
Sandun Blazon Lanka Poulier
Unit - 05
011362
ISO 31000 risk management mythology
Since the international organization for standardization has developed a voluntary standard to
assist organizations in risk management it is the engineering that is developed and managed the
risks related to the way in which they are applied. This structure consists of inaugurating clear
principles and a solid framework which could build foundations and process for effective risk
management. The construction of a detailed framework within any of the four main committees
consist of a design, implementation, monitoring, review and continuous improvements.
Identification of risks.
This highlights all the source of risk or threats and their capacity for EMC cloud solution.
Validating the information is much important to determine the credibility of the threat and the
risks it may generate. Only when a complete list of threats and their risks can be begun to
understand the impact and the likelihood of the event.
Risks evaluation
Considering the risk which is identifies and the implications of the occurrences leads the more in
a risk evaluation. It is important to apply a solid and objective risk analysis at this stage which
takes into the account the provision of expert advice and variations. If a demanding analysis isn’t
applied more underestimated or less impact of risks on objectives of the organization would
occur.
Treatment of risks
This should target to disregard or even reduce the risk to a less practical level of lenience or
compassion for the organization. If this isn’t done, it is a must to reevaluate to avoid or even
accept. Bearing in mind which implies a balance in costs and efforts. Addressing risks as part of
any mitigation plan can lead to new risks and those should have also been evaluated.
3.3 Comment on the topic, ‘IT Security & Organizational Policy’
3.3.1 IT security policy
An Information Technology (IT) Security Policy identifies the rules and procedures for all
individuals accessing and using an organization's IT assets and resources. Effective IT Security
Policy is a model of the organization’s culture, in which rules and procedures are driven from its
employees' approach to their information and work. Thus, an effective IT security policy is a
unique document for each organization, cultivated from its people’s perspectives on risk
tolerance, how they see and value their information, and the resulting availability that they
maintain of that information. For this reason, many companies will find a boilerplate IT security
policy inappropriate due to its lack of consideration for how the organization’s people actually
use and share information among themselves and to the public.
Sandun Blazon Lanka Poulier
Unit - 05
011362
The objectives of an IT security policy is the preservation of confidentiality, integrity, and
availability of systems and information used by an organization’s members. These three
principles compose the CIA triad:
•
•
•
Confidentiality involves the protection of assets from unauthorized entities
Integrity ensures the modification of assets is handled in a specified and authorized
manner
Availability is a state of the system in which authorized users have continuous access to
said assets
3.3.2 Organizational Policy
An organizational policy will undertake a spacious part in its choices and direction, yet it
ought not to modify its mission. Therefore, it is important to write a policy that is drawn from the
organization’s current social and structural system to help the continuity of good efficiency and
development, and not as a generic policy that hinders the organization and its clients from
meeting its goal and objectives.
A security policy is expected to do many things. Primarily it should protect people and
information, as well as set the rules for expected behavior by users, system administrators,
management and security personnel. It should also authorize relevant personnel to monitor,
probe, investigate, define and authorize the consequences of violations, in addition to defining
the company’s baseline stance on security. This can help minimize risk and help track
compliance with appropriate regulations. Accordingly, and organizational use policy is to outline
rules of actions which is to conduct transaction with security issues. Organizational policies
make staff understand the organizations views on a specific issue. Policies reveals common
reports of how an organization must be performed. In other words, policy can be security related
which can be used to recognize threats and migrate threats. If an organization never follows the
organizations policy, it might lead to security issues.
Before a specific policy document is composed, the general goal of the policies must be
resolved. The initial step is to figure out what is being ensured and find out why it’s being
secured. Moreover, policies can be composed to affect hardware, software, connections,
networks, telecommunications, enforcements and more. Before the writing process is started
figuring out in which system and processes are essential to the organizations goal is a must. That
would help to figure out what and how many policies are important to finish the main goal. All
things are considered as, the goal which is guaranteed, considered all the conceivable areas in
which a policy is required.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Task 4
4.1 Develop a security policy for EMC Cloud to minimize exploitations and
misuses while evaluating the suitability of the tools used in an organizational
policy.
In order to make sure the EMC cloud solution is kept secured, the following policies which is
given below should or must be applied or implemented to all employees requiring access;
Entering to the EMC cloud
•
•
•
•
Employee must check in with the fingerprint.
Each Employee should have an employee ID and they must wear the EMC ID at all
times.
Employee card must be swiped at the gate and the even at the porch.
Any personal entering should sign in when visiting and the purpose of the visit should be
stated appropriately.
Stay in visiting
•
•
•
Customers to the EMC must adhere to the customer’s guidelines.
Invitees who comes to visit the solution must definitely enter in with an employee of the
EMC cloud.
The purpose of the visit should be documented or recorded.
Usage
•
•
•
•
•
•
•
Unless permission granted by the solution employees can’t install, remove, delete or
change the data’s which is stored or destroy any of the equipment’s.
Equipment stored within the EMC must come across assured system conditions.
Passwords should contain at least 8 characters and in active for more than a minute and
must be automatically logged out.
Employees must use the provided laptops given by the solution.
Equipment’s brought from outside shouldn’t be used within the solution.
An exact form must be filled for all equipment installations, changes and removals.
Equipment stored within the EMC must come across assured system conditions.
Sandun Blazon Lanka Poulier
Unit - 05
011362
4.2 Develop and present a disaster recovery plan for EMC Cloud for its all
venues to ensure maximum uptime for its customers (Student should produce
a PowerPoint-based presentation which illustrates the recovery plan within 15
minutes of time including justifications and reasons for decisions and options
used).
•
Refer appendix (A, B, C, D, and E) below.
4.3 ‘Creditors, directors, employees, government and its agencies, owners /
shareholders, suppliers, unions, and the other parties the business draws its
resources’ are the main branches of any organization. Discuss the role of these
groups to implement security audit recommendations for the organization.
A security Audit is a systematic evaluation of the security of a company’s information system by
measuring how well it adapts to a set of recognized criteria.
Audits could happen in every corporation; it could even happen in EMC cloud too. If it is so
there are few things to be considered. The recommendations of the stakeholders the people who
are interested in business should be granted.
The roles of each stakeholder who implements the recommendations fluctuate from person to
person. Accordingly, this is connected to the business hierarchy.
For an example:
•
Creditors: As for audits it requires high amount of money, the company alone cannot
invest the finance. As in this case creditors play a major role. Loans from state banks can
be taken.
•
Employees: They are considered as the backbone of an organization. The effort is
priceless; therefore, recommendations should be asked by them too. They introduce
policies and procedures about home the data center works. There the auditors can get a
clear idea how the organization runs
•
Directors: The decisions are totally taken by them. The management is divided into three
main categories as Top level management, Middle level management and lower level
management. The top level holds the higher standard I the firm. Audit permissions are
totally depending on them.
Sandun Blazon Lanka Poulier
Unit - 05
011362
•
Investors: we should keep in mind that investors hold a very higher percent in audits of
the organization. If the organization needs more invests and shares it is them who does
that job.
4.3.1 Implement security audit recommendations for the organization.
A critical element of any good EMC cloud solution is the ability to identify and understand risks
that may damage the organization, then take proper precautions to prevent them from happening
and to reduce the impact of the results should precautions fail. To avoid damaging events, build
customer trust, and meet compliance requirements, it is important for organizations to ensure
they have the right processes and controls in place.
Data Ownership issues
This is another issue that have to deal with when working for an ISP/hosting provider. Being
physically separate from the data means that have need to make even more risk based decisions
in a cloud computing environment. If the data hosting off site is public in any way, then there is
less to be concerned about. However, if the data is sensitive or too much confidential, you may
want to take extra care to safeguard it at remote sites (encryption, physical security, etc.). For
example, the recommendation from the Cloud Computing Security Alliance is that "Customers
should perform onsite inspections of cloud provider facilities whenever possible."
What so struggling with how this is different than using a remote storage facility for the backup
tapes. Encryption of the sensitive data is an important safeguard, whether the data lives on a
backup tape or "somewhere in the cloud". Almost equally as important as data encryption is
ensuring that access to manage the cloud services is protected. While the data may be public,
might would not want an attacker to have the ability to change the web site or use it to collect
credentials or sensitive data’s.
Data Loss Due To Technical Failure
This has less to do with security and more to do with backups and disaster recovery planning. If
so keeping backups, or even running "hot sites", have to make sure they are part of the regular
patching and vulnerability assessment schedule. Since they take an exact copy of the data and
systems, they need the same level of protection and vulnerability management as the production
systems.
Test the system continuity plan regularly without any malware or any third party attacks
Continuity plan testing is performed to ensure the process will work and the organization can
continue to operate after a business interruption. The organization should consider the
availability of critical staff, the equipment needed to resume operations, the methods needed to
restore data, and the time it takes to restore services. The test should be performed annually.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Both the business continuity and disaster recovery plan should be updated to reflect lessons
learned from the testing event.
Use strong data encryption to transmit restricted data or restricted information over public
networks
Most organizations assume that transmitting data over a public telephone line is safe. Encryption
of all data leaving the physical safety of the organization is the best defense against
vulnerabilities due to misconfiguration or unprincipled individuals.
Sandun Blazon Lanka Poulier
Unit - 05
011362
Appendix
Appendix A (Disaster recovery plan presentation slide-1)
Appendix B (what is a disaster slide - 2)
Sandun Blazon Lanka Poulier
Unit - 05
011362
Appendix C (disaster that affects EMC cloud slide - 3)
Appendix D (Approaches for EMC cloud disaster recovery plan slide - 4)
Sandun Blazon Lanka Poulier
Unit - 05
011362
Appendix E (Objectives of EMC cloud disaster recovery plan slide - 5)
Sandun Blazon Lanka Poulier
Unit - 05
011362
Gantt chart
January 2020
1st
2nd
February 2020
3rd
4th
2nd
3rd
4th
March 2020
4th
1st
2nd
3rd
4th
Task 01
Task 02
Task 03
Task 04
Sandun Blazon Lanka Poulier
Unit - 05
011362
References
Beal, V., 2019. NAT - Network Address Translation. [Online]
Available at: https://www.webopedia.com/TERM/N/NAT.html
[Accessed 13 9 2019].
Beal, V., 2019. firewall. [Online]
Available at: https://www.webopedia.com/TERM/F/firewall.html
[Accessed 9 6 2019].
chrisbhoffman, 2019. How to greek. [Online]
Available at: https://www.howtogeek.com/133680/htg-explains-what-is-a-vpn/
[Accessed 9 6 2019].
Rouse, M., 2019. confidentiality, integrity, and availability (CIA triad). [Online]
Available at: https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availabilityCIA
[Accessed 9 6 2019].
Rouse, M., 2019. network monitoring. [Online]
Available at: https://searchnetworking.techtarget.com/definition/network-monitoring
[Accessed 14 9 2019].
Rouse, M., 2019. static IP address/dynamic IP address. [Online]
Available at: https://searchwindevelopment.techtarget.com/definition/static-IP-address-dynamicIP-address
[Accessed 13 9 2019].
Webopedia Staff, 2019. DMZ - demilitarized zone. [Online]
Available at: https://www.webopedia.com/TERM/D/DMZ.html
[Accessed 13 9 2019].
Sandun Blazon Lanka Poulier
Unit - 05
011362
Download