To total this assignment, overview the instantaneous and grading rubric in the Module Four Activity Pointers and Rubric. It’s also possible to deserve to compile entry to the Module Four Activity Template Note Document.
-
ModuleFourActivityGuidelinesandRubric-CYB-200-13406-M01CybersecurityFoundations2024C-5Sep-Oct.pdf
-
CYB200ModuleFourActivityTemplate.pdf
CYB 200 Module Four Activity Pointers and Rubric
Overview
In this order, you’re going to develop a feature-basically basically based mostly compile entry to manage (RBAC) matrix for person compile entry to manage. RBAC matrices, as a security structure conception, are numerous represen�ng compile entry to
regulate recommendations visually. They lend a hand the prac��oner make certain that that the compile entry to manage strategy aligns with the pronounce compile entry to manage objec�ves. Matrices also lend a hand point out when compile entry to controls
could well per chance per chance additionally warfare with job roles and responsibili�es. Whenever you are comple�ng this form of process, there are a few ques�ons you ought to composed constantly be :
Who gets to log into the system?
Who gets to scrutinize what?
What assemble of recordsdata are you going through (fashioned recordsdata vs. informa�on self-discipline to privacy controls)?
Who gets as a design to add or delete? Who is scrutinize-handiest?
Who haven’t got permission?
An instance of an RBAC matrix could well per chance per chance additionally be point out in Chapter 6 of your route textbook.
Scenario
You can additionally per chance be a security analyst for a healthcare firm assigned to create an RBAC matrix for a brand recent so�ware-as-a-carrier (SaaS) applica�on for managing pa�ent medical recordsdata. There are six
participants who absorb roles one day of the system and desire varying ranges of compile entry to to the medical pa�ent so�ware. Your objec�ves are to region up the RBAC matrix to:
Be particular participants absorb compile entry to to main informa�on for his or her job feature
Withhold pa�ent privacy by adhering to the Traditional Security Invent Thought of least privilege (i.e., exchange need-to-know)
The next SaaS applica�on parameters have to be optimistic:
1. Access to pa�ent informa�on
2. Access to employee informa�on
3. Access to the SaaS
4. Access to backup logs
Glimpse the Person Job Roles and Characteris�cs table under for informa�on on the users, their roles in the organiza�on, and their job descrip�ons.
Customers Job Roles Job Characteris�cs
9/22/24, 2:21 PM Project Data
https://be taught.snhu.edu/d2l/le/philosophize/1698647/viewContent/35102836/Uncover 1/4
Norman Remote name-middle employee
Has the flexibility to log into the medical SaaS as an employee, and has distant compile entry to to employee machines for
reason of fixing or diagnosing computer issues
Has the flexibility to create person accounts and establish passwords
Has no comely to scrutinize pa�ent informa�on
Has the flexibility to scrutinize the backup logs for most indispensable system informa�on
Ryhead Gross sales representa�ve for the healthcare
firm
Has compile entry to to the so�ware however handiest for exhibiting poten�al recent possibilities
Has the flexibility to create dummy person accounts for demo functions
Has no capability to alter any pa�ent informa�on, and could well per chance handiest point out monitors for demo functions
Has no compile entry to to the backup logs
Simone HR representa�ve for the healthcare
firm
Has the flexibility to log into the system
Has no abili�es with person accounts
Has compile entry to to the so�ware and employee records however must haven’t any compile entry to to pa�ent informa�on
Has no compile entry to to the backup logs
Janet Applica�on administrator for the SaaS
applica�on
Has plump compile entry to to so�ware, has the flexibility to trade or alter se�ngs in the system as wished, and has the flexibility
to give an override code
Has the flexibility to scrutinize, create, alter, and delete person accounts
Has no rights to trade pa�ent informa�on
Has the flexibility to scrutinize, alter, and delete backup logs for the SaaS
Dale Nurse
Has compile entry to to the system for pa�ent informa�on.
Has no abili�es with person accounts.
Has the flexibility to scrutinize, create, and alter pa�ent informa�on, however does no longer absorb the comely to delete pa�ent
informa�on with out an override code
Has no compile entry to to backup logs
9/22/24, 2:21 PM Project Data
https://be taught.snhu.edu/d2l/le/philosophize/1698647/viewContent/35102836/Uncover 2/4
Ethan Auditor
Has the flexibility to log into the system however can handiest scrutinize informa�on
Has no abili�es with person accounts
Has no capability to create, alter, or delete pa�ent informa�on
Has the flexibility to scrutinize backup logs
Urged
Namely, you ought to take care of the cri�cal sides listed under:
I. RBAC Matrix: Populate the RBAC matrix in the Module Four Ac�vity Template utilizing one or extra of the mandatory ac�ons (scrutinize, create, alter, delete, none).
II. Essen�al Ques�ons: Resolution the next fast response ques�ons basically basically based totally on your populated table in the template:
A. What adjustments will doubtless be made to person roles through implementa�on of least privilege to be�er make stronger that security assemble precept? (Mark: Talk about with the characteris�cs in the
self-discipline table above, and clutch into myth the characteris�cs that could per chance be contradictory.)
B. What is the importance of this instrument to you as a security analyst in managing and protec�ng the ambiance? Provide an instance.
What to Submit
Submit the done RBAC matrix and fast response ques�ons in the Module Four Ac�vity Template. You can additionally post this ac�vity on your contain Microso� Note document, however your
submission must compile the an analogous sides because the template. Your submission ought to be 1–2 pages in length (plus a duvet page and references, if passe) and wri�en in APA structure. Use double
spacing, 12-point Times New Roman font, and one-hasten margins. The file name ought to composed embody the route code, assignment quantity, and your name—as an illustration,
CYB_200_Module_Four_Ac�vity_Neo_Anderson.docx.
Module Four Activity Rubric
Standards Proficient (100%) Desires Enchancment (65%) Now not Evident (0%) Value
RBAC Matrix Completes 21 or extra cells of the RBAC
matrix precisely
Completes fewer than 21 cells of the
RBAC matrix precisely
Does no longer total any of the RBAC
matrix cells precisely
65
Least Privilege Describes adjustments that could well per chance per chance additionally be made to the
person roles through implementa�on of least
privilege that is at possibility of be�er make stronger the
security assemble precept
Addresses “Proficient” standards, however there
are gaps in readability, good judgment, or detail
Does no longer take care of cri�cal component, or
response is inappropriate
15
9/22/24, 2:21 PM Project Data
https://be taught.snhu.edu/d2l/le/philosophize/1698647/viewContent/35102836/Uncover 3/4
Standards Proficient (100%) Desires Enchancment (65%) Now not Evident (0%) Value
Importance of Instrument Explains the importance of the instrument to a
security analyst in managing and
protec�ng the ambiance, and supplies
an instance
Addresses “Proficient” standards, however there
are gaps in readability, good judgment, or detail
Does no longer take care of cri�cal component, or
response is inappropriate
15
Ar�cula�on of Response Submission has no important errors related to
cita�ons, grammar, spelling, or
organiza�on
Submission has some errors related to
cita�ons, grammar, spelling, or
organiza�on that nega�vely affect
readability and ar�cula�on of main concepts
Submission has cri�cal errors related to
cita�ons, grammar, spelling, or
organiza�on that end working out of
concepts
5
Total: 100%
9/22/24, 2:21 PM Project Data
https://be taught.snhu.edu/d2l/le/philosophize/1698647/viewContent/35102836/Uncover 4/4
,
CYB 200 Module Four Activity Template After reviewing the topic in the Module Four Activity Pointers and Rubric document, absorb in every cell with one or extra of the next actions:
• Uncover • Assemble • Adjust • Delete • None
Person name Patient recordsdata Worker recordsdata Access to the SaaS Access to backup logs
Norman
Ryhead
Simone
Janet
Dale
Ethan
After you absorb done the table above, acknowledge to the next fast questions:
1. What adjustments will doubtless be made to person roles through implementation of least privilege to raised make stronger that security assemble precept? (Mark: Talk about with the traits in the person job roles and traits table in the topic, and clutch into myth the traits that could per chance be contradictory.)
2. What is the importance of this instrument to you as a security analyst in managing and conserving the ambiance? Provide an instance.
- WE OFFER THE BEST CUSTOM PAPER WRITING SERVICES. WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU.
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO ChatGPT.NO PLAGIARISM – CUSTOM PAPER
Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.
We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.
Why Choose AcademicWritersBay.com?
- Our papers are 100% original, custom-written from scratch.
- We’re here to support you around the clock, any day of the year.
- You’ll find our prices competitive and reasonable.
- We handle papers across all subjects, regardless of urgency or difficulty.
- Need a paper urgently? We can deliver within 6 hours!
- Relax with our on-time delivery commitment.
- We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
- Benefit from unlimited amendments upon request to get the paper you envisioned.
- We pledge our dedication to meeting your expectations and achieving the grade you deserve.
Our Process: Getting started with us is as simple as can be. Here’s how to do it:
- Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
- Provide the specifics of your paper in the “PAPER DETAILS” section.
- Select your academic level, the deadline, and the required number of pages.
- Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
- Follow the simple payment instructions and soon, our writers will be hard at work on your paper.
AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.