Operational Compliance

 

Operational security compliance is a necessity in any working cybersecurity environment, as it sets the standard for policy, rule, and guideline regulation. Therein, it is necessary for security professionals to grasp the fundamental aspects of operational compliance, if they are expected to be able to manage day-to-day operations that require a different level of compliance throughout a given organization.

Students will create a web portal data flow diagram of their hypothetical organization’s operational environment using Visio or a similar diagramming software. Within the web portal data flow diagram, students will show how the web portal is compliant. The web portal data flow diagram must:

  1. Display the organization’s technical requirements (related and unrelated applications, services and links).
  2. Display the compliance of associated servers, routers, access-control components, data storage, internal and external data communication, data backup, e-mail servers, and so forth.
  3. Identify related systems and assets, regulatory requirements, and overall risk approach.
  4. Demonstrate each IT task to the next as aligned to regulations/compliance. For example, start with the user logging in, and then go through each step and how it is validated.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-650 Operational Compliance Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

Tags: No tags