IDNLearn.com makes it easy to find precise answers to your specific questions. Ask your questions and get detailed, reliable answers from our community of knowledgeable experts.

locate and read the personnel security policy in the nist cybersecurity framework policy template guide. research online for a real-world implementation example of the standard/policy and compare it with the nist policy template side by side.

Sagot :

Locate and read the Personnel Security Policy in the NIST Cybersecurity Framework Policy Template Guide. Research online for a real-world implementation example of the standard/policy and compare it with the NIST policy template side by side.

Answer the following questions clearly and systemically in this Word document. Make sure to include a References section toward the end of the document.

1) The Personnel Security Policy is implemented for which NIST functions and sub-categories?

Answer: The organization we took as an example is Amazon Web services.

It is under the e-commerce section of industry.

2) Which organization is the implementation example you identified for? Which industry sector (e.g., education, government, etc.) is the organization in?

Answer: Purpose of example policy:-

  • Cybersecurity risk management
  • Building resilient systems.
  • The policy is applicable to the network and the data centre that is all the parties involved in AWS. The developer is responsible for implementing this policy and the customer also has shared controls and must adhere to NIST Policies.

3) What is the purpose of the example policy? Which party (parties) does the policy apply to? Who is/are responsible for implementing this policy?

Answer: The one occurrence of customization is that AWS has stringent policies for granting access to employees and the control management is done by limiting information access.

4) As compared to the NIST policy template, how is the example policy customized to fit the needs of the organization? Describe two occurrences of the customization in detail.

Answer: The criteria are:

  • Cybersecurity policies Evaluation
  • Determination of the cybersecurity posture
  • Check the resource planning
  • security compliance to be evaluated by checking the products
  • Restructure the security teams

To learn more about cybersecurity visit:

https://brainly.com/question/27560386

#SPJ4