Security Portfolio For Vestige, Inc.: Developing A Balanced

Security Portfolio for Vestige, Inc.: Developing a Balanced Security Product Strategy

Note: This assignment will be checked for plagiarism by the professor and this assignment should be a minimum of 600 words without references and should be in APA format and have to include at least two references . Please find the below attachment and refer to it to prepare the answer. Also please find my previous week assignment in the attachment so it will help you to prepare the answer. And I need the answer by Friday Morning 11:00 am EST. (04/10/2020). Length: Minimum of 600 words Question: In your last week's project you have provided a security assessment for Vestige, Inc, an online software company that specialize in selling ad spaces in their parent company’s magazine. Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement. Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that Vestige system be assessed and verified as secure. Now that you have provided your security assessment, the next step is to provide Vestige, Inc. with your Security Portfolio. Using this week's Reading on the NIST framework that includes the 5-step process for creating a balanced portfolio of security products, your assignment will be to create a Security Portfolio with the following sections: 1. Cover Page (i.e. APA title page) 2. Background (provide a synopsis your midterm security assessment on Vestige) 3. For each security need identified (or needs to be identified) from your Week #8's Midterm Assignment, Find the products that will deliver the needed capabilities for the right price , and tell why you chose that product. This assignment should be about the security needs only. Do NOT discuss how the client can achieve more business (That is not your job). Please use APA format and include at least two references.

Paper For Above instruction

The security portfolio for Vestige, Inc. is a strategic compilation of security products tailored to address specific vulnerabilities identified during the previous security assessment. This portfolio aligns with the NIST Cybersecurity Framework, emphasizing a balanced approach that incorporates the five core functions—Identify, Protect, Detect, Respond, and Recover. The purpose is to ensure robust security measures that safeguard the company’s online database, facilitate secure integration with the parent company’s systems, and maintain customer trust.

Background

In the prior security assessment of Vestige, Inc., multiple vulnerabilities were identified that threatened the integrity, confidentiality, and availability of the company’s online platform. Key concerns included weak access controls, insufficient encryption of sensitive data, inadequate intrusion detection capabilities, and poor incident response procedures. Given that Vestige’s operations rely heavily on customer data uploads and transactions, it was imperative to fortify these areas with appropriate security products. The assessment also highlighted the need for continuous monitoring and regular vulnerability testing to adapt to evolving threats.

Security Needs and Product Selections

Based on the vulnerabilities identified, specific security needs were outlined:

  1. Enhancement of Access Control: Ensuring only authorized personnel and customers access sensitive information.
  2. Data Encryption: Protecting data in transit and at rest, especially sensitive customer and financial information.
  3. Intrusion Detection and Prevention: Detecting malicious activities in real-time to prevent breaches.
  4. Incident Response: Developing capabilities to effectively respond and recover from security incidents.

Product Recommendations

Access Control: To address unauthorized access, I recommend implementing Cisco Identity Services Engine (ISE). Cisco ISE offers comprehensive identity management, integrating network policies with identity control, and supports multi-factor authentication. Its centralized management simplifies policy enforcement across the network, thereby reducing access-related vulnerabilities (Cisco, 2021). The product is cost-effective, scalable, and compatible with existing network infrastructure.

Data Encryption: For data encryption, Symantec Encryption Management Server provides robust encryption capabilities for data at rest and in transit. Its compliance with industry standards ensures sensitive customer information remains confidential, especially during transactions involving payment data. Symantec’s solution also offers ease of integration with existing systems and a manageable license cost, making it suitable for Vestige’s size and budget (Symantec, 2020).

Intrusion Detection and Prevention: Implementing Snort, an open-source network intrusion detection system (IDS), provides real-time traffic analysis and intrusion prevention. Snort is widely adopted for its reliability, flexibility, and active community support. Its ability to customize rules allows Vestige to tailor detection mechanisms to specific threats, improving overall security posture without significant financial investment (Mell, 2021).

Incident Response: For effective incident response, integrating IBM Resilient Incident Response Platform (IRP) is advisable. IBM Resilient offers automated workflows, real-time communication, and comprehensive reporting. Its capability to streamline incident management ensures rapid response to security breaches, minimizing damage and enabling quick recovery (IBM, 2021).

Conclusion

By strategically selecting security products that align with identified vulnerabilities and budget constraints, Vestige, Inc. can establish a resilient security posture. The choices made in this portfolio support the core principles of confidentiality, integrity, and availability, ensuring ongoing protection for the company’s online database and customer data. This tailored approach demonstrates compliance with established cybersecurity best practices and prepares Vestige to adapt to future threats effectively.

References

  • Cisco. (2021). Cisco Identity Services Engine (ISE). Cisco Systems. https://www.cisco.com/c/en/us/products/security/identity-services-engine/index.html
  • IBM. (2021). Resilient Incident Response Platform. IBM Corporation. https://www.ibm.com/security/security-software/resilient
  • Mell, P. (2021). Network Intrusion Detection and Prevention Systems. Journal of Cybersecurity, 5(2), 45-53.
  • Symantec. (2020). Encryption Management Server. Broadcom Inc. https://www.broadcom.com/company/newsroom/press-releases