CYB 260 Project Three SLA Requirement Recommendations Sumer Piggush
CYB 260 Project Three SLA Requirement Recommendations Sumer Piggush
CYB 260 Project Three SLA Requirement Recommendations Sumer Piggush
Selected Sub-Controls:
aligns with the requirement to restrict access across the network. By establishing clear
guidelines on who can have administrative access and under what circumstances, we
mitigate the risk of unauthorized access and potential internal or external attacks. This
Justification: Enforcing a standard for controlled access based on the principle of need-to-
know aligns with the requirement to restrict physical access and data handling. By
standardizing the process of determining access rights according to job roles and data
A training program is essential to address the specific social engineering threat outlined in the
Service Level Agreement, particularly focusing on email phishing attacks. Social engineering
tactics exploit human vulnerabilities, making employees the first line of defense against such
threats. Without adequate training, employees may inadvertently fall victim to phishing emails,
Increased Awareness: Employees will be equipped with the knowledge and skills to
phishing attempts, including reporting suspicious emails and refraining from clicking on
Reduced Risk: By actively engaging in security awareness training and applying best
attacks, thereby minimizing the risk of data breaches and protecting customer
information.
Cultural Shift: Over time, the training program will foster a security-conscious culture
practices.
will enable ongoing learning and refinement of employees' security awareness, ensuring
Anders, L. (2023, September 7). How to Train Employees on Phishing Awareness: A Step-by-
on-phishing-awareness
Cardella, J. (2017, March 24). The CIS Critical Security Controls Explained - Control 4:
https://www.rapid7.com/blog/post/2017/03/24/the-cis-critical-security-controls-
explained-control-5-controlled-use-of-administrative-privilege/
Lynch, P. (2019, June 22). CIS Critical Security Control #14: Controlled Access Based on the
critical-security-control-14-controlled-access-based-on-the-need-to-know/