COP 610 Security Architecture Report
Order Number
|
636738393092 |
Type of Project
|
ESSAY
|
Writer Level
|
PHD VERIFIED
|
Format
|
APA
|
Academic Sources
|
10
|
Page Count
|
3-12 PAGES
|
Instructions/Descriptions
COP 610 Security Architecture Report
[Order Now]
Project 4 Report
<DATE>
<Your Name>
COP 610 Security Architecture Report
For my work I need you to answer the following questions listed under ( Part#1,2 Zero Trust Security Architecture Summary & Zero Trust Maturity Model) through reading those two documents that I provided. Instructions are listed highlighted in yellow for you to follow it through.
For this step, you will use the information found in the NIST SP800-207 document and answer several questions related to the Zero Trust Security Architecture. Use the COP 610- Project 4 reporting template to respond to each of the questions in section 1. – Zero Trust Security Architecture Summary . COP610-Project4_Report_Template.docx
To understand the concepts of NIST’s Zero Trust Architecture, read chapters 1-5 of the NIST.SP.800-207.pdf You will see seven (7) underlying principles:
- All data sources and computing services are considered resources
[Order Now]
- All communication is secured regardless of network location
- Access to individual enterprise resources is granted on a per-session basis
- Access to resources is determined by dynamic policy—including the observable state of client identity, application/service, and the requesting asset—and may include other behavioral and environmental attributes
- The enterprise monitors and measures the integrity and security posture of all owned and associated assets
- All resource authentication and authorization are dynamic and strictly enforced before access is allowed
- The enterprise collects as much information as possible about the current state of assets, network infrastructure and communications and uses it to improve its security posture.
As you review the scenarios and use cases found in chapter 4, be sure to consider which scenario might be appropriate for an application or system deployment you might be involved in now or in the future.
Also, be sure to take note of the threats associated with Zero Trust Architecture found in Chapter 5. Unfortunately, no architecture or design is perfect and some form of risk will be assumed. For these threats additional protections and controls must be implemented. For example, for Denial-of-Service attacks a zero trust architecture could still fall victim. Mitigations might include additional access control lists, load balancers and additional intrusion detection systems.
- Zero Trust Security Architecture Summary
After completing the assigned reading of chapters 1-5 in the NIST SP800-207 document, answer the following questions:
- Summarize the basic premise of Zero Trust Architecture. (1-2 sentences, in your own words will suffice)
- Multifactor authentication (MFA) appears to be a critical technology in a Zero Trust Security Architecture. Explain why this is the case in 1 or 2 paragraphs.
- The logical components of the Zero Trust Security Architecture are policy focused. Describe each of the policy related components of this architecture Describe how the additional components in the Zero Trust architecture (e.g. Threat Intelligence Feeds, Logs, SIEM…) support the enforcement of policies for system resources. (2-3 paragraphs will suffice)
- A new start-up company, Cloud Concerto, wants to use the Zero Trust Security Architecture to use database, servers, storage and authentication services available from multiple cloud vendors including Google, Microsoft and AWS. What Deployment/use case would be appropriate? Describe why you selected this deployment option in one paragraph or less.
- Stolen credentials and Insider threats are still a problem for systems following Zero Trust Security Architecture guidance. However, the Zero Trust Security Architecture does help reduce some of the risk. In 1-2 paragraphs, discuss how this architecture helps mitigate the risks but also may expose some sensitive data or components of the system.
For this step, you will use the information found in the CISA Zero Trust Maturity Model_Draft.pdf document and answer several questions related to the Zero Trust Maturity Model. Use the COP 610- Project 4 reporting template to respond to each of the questions in section 2. – Zero Trust Maturity Model. COP610-Project4_Report_Template.docx
- Zero Trust Maturity Model
After reading the Zero Trust Maturity Model document respond to the following questions:
[Order Now]
- In your opinion, why is a gradient approach (i.e. the maturity model levels of traditional, advanced, and optimal) to implementing the Zero Trust Security Architecture a good approach? Hint: you might want to conduct some research on other maturity models such as Capability Maturity Model Integration (CMMI) as a reference. (1-2 paragraphs will suffice)
- You are in charge of bringing your organization to the Advanced stage of the Zero Trust Maturity Model for all 5 pillars. Using the table below, add functions and stage descriptions for each of the 5 pillars for the Advanced stage only. Note this is a direct copy and paste from the document and will serve as a path to a roadmap for future implementation.
You will need to add rows to the table, as needed to ensure each pillar and function is listed.
Table 1. Advanced Stage Zero Trust Maturity Model Goals
Pillar |
Function |
Advanced Stage |
Identity |
Authentication |
Agency authenticates identity using MFA. |
|
|
|
|
|
|
|
|
|
|
|
|
… |
|
|
COP 610 Security Architecture Report
PLACE THE ORDER WITH US TODAY AND GET A PERFECT SCORE!!!