{"id":18188,"date":"2024-03-29T02:27:19","date_gmt":"2024-03-29T02:27:19","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/physical-environmental-protection-policy-and-secure-system-development-life-cycle-standard\/"},"modified":"2024-03-29T02:27:19","modified_gmt":"2024-03-29T02:27:19","slug":"physical-environmental-protection-policy-and-secure-system-development-life-cycle-standard","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/physical-environmental-protection-policy-and-secure-system-development-life-cycle-standard\/","title":{"rendered":"Physical &#038; Environmental Protection policy and Secure System Development Life Cycle Standard"},"content":{"rendered":"<p>Part 1: Physical and Environmental Protection Policy<\/p>\n<p>Locate and read the Physical and Environmental Protection Policy in the NIST Cybersecurity Framework Policy Template Guide. Research online for a real-world implementation example of the policy and compare it with the NIST policy template side by side. <\/p>\n<p>Answer the following questions clearly and systemically in this Word document. Make sure to include a References section toward the end of the document.<\/p>\n<p>The Physical and Environmental Protection Policy is implemented for which NIST function and sub-categories? [5 points]<\/p>\n<p>Answer:<\/p>\n<p>Which organization is the implementation example you identified for? Which industry sector (e.g., education, government, etc.) is the organization in? [5 points]<\/p>\n<p>Answer:<\/p>\n<p>What is the purpose of the example policy? Which party (parties) does the policy apply to? Who is\/are responsible for implementing this policy? [5 points]<\/p>\n<p>Answer:<\/p>\n<p>As compared to the NIST policy template, how is the example policy customized to fit the needs of the organization? Describe three occurrences of customization in detail. [15 points]<\/p>\n<p>Answer:<\/p>\n<p>Part 2: Secure System Development Life Cycle Standard<\/p>\n<p>Locate and read the Secure System Development Life Cycle Standard in the NIST Cybersecurity Framework Policy Template Guide. Research online for a real-world implementation example of the standard\/policy and compare it with the NIST policy template side by side. <\/p>\n<p>Answer the following questions clearly and systemically in this Word document. Make sure to include a References section toward the end of the document.<\/p>\n<p>The Secure System Development Life Cycle Standard is implemented for which NIST functions and sub-categories? [5 points]<\/p>\n<p>Answer:<\/p>\n<p>Which organization is the implementation example you identified for? Which industry sector (e.g., education, government, etc.) is the organization in? [5 points]<\/p>\n<p>Answer:<\/p>\n<p>What is the purpose of the example standard\/policy? Which party (parties) does the standard\/policy apply to? Who is\/are responsible for implementing this policy? [5 points]<\/p>\n<p>Answer:<\/p>\n<p>As compared to the NIST policy template, how is the example standard\/policy customized to fit the needs of the organization? Describe two occurrences of the customization in detail. [10 points]<\/p>\n<p>Answer:<\/p>\n<p>If specified in the example standard\/policy, how frequent is the policy reviewed for potential modifications? If not specified in the example standard\/policy, what are your recommendations? [5 points]<\/p>\n<p>Answer:<\/p>\n<p>References<\/p>\n<p>1.<br \/>\n2.<br \/>\n3.&nbsp;<\/p>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>I think what my Prof is looking for is less is more? Please view the example below?&nbsp;<\/div>\n<div><\/div>\n<div><span style=\"font-size: 11px; cursor: auto; color: inherit;\">From my Professor:&nbsp;<\/span><\/div>\n<div><span style=\"font-size: 11px; cursor: auto; color: inherit;\">This is not that difficult, just note the following: The correct answers are: Part 1: Security Awareness and Training Policy Answer: ID.AM &amp; PR.AT Function: Identify &amp; Protect Sub-category: ID.AM-1, ID.AM-2, ID.AM-6 &amp; PR.AT-1 (Policy Template Guide &#8211; CIS Center for Internet Security 2021) Part 2:Contingency Planning Policy Recover: Recovery Planning (RC.RP) RC.RP-1 Recovery plan is executed during or after a cybersecurity incident. Recover: Improvements (RC.IM) RC.IM-1 Recovery plans incorporate lessons learned. RC.IM-2 Recovery strategies are updated.&nbsp;<\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Part 1: Physical and Environmental Protection Policy Locate and read the Physical and Environmental Protection Policy in the NIST Cybersecurity Framework Policy Template Guide. Research online for a real-world implementation example of the policy and compare it with the NIST policy template side by side. Answer the following questions clearly and systemically in this Word [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/18188"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=18188"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/18188\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=18188"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=18188"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=18188"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=18188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}