Organizational Policies and Procedures Report.docx -...

This preview shows page 1 - 4 out of 7 pages.

RUNNING HEAD: Organizational Policies and ProceduresJoi RobinsProject 4: Organizational Policies and Procedures UMGC
Organizational Policies and Procedures Table of ContentsVulnerability Assessment............................................................................................................................3Incident Detection and Prevention...............................................................................................................4Incident Response Plan................................................................................................................................52
Organizational Policies and Procedures Vulnerability AssessmentOverviewVulnerability assessments represent an essential component of any information security program, and the process of an assessment is vital to effective vulnerability management. Vulnerability assessment providesvisibility into the vulnerability of assets deployed in the network. Furthermore, it provides direction on how to assess the risks associated with weaknesses and evolving threats (Nelson, 2004). Remediation of the vulnerabilities is another factor of the assessment.PurposeTo permit authorization of Greiblock Credit Union information security personnel to perform information security vulnerability assessment to determine areas of vulnerability.ScopeThis policy applies to IT Security Operations Department personnel employed at Greiblock.Policya. The development, implementation and execution of the vulnerability assessment process is the responsibility of the IT security team under the authority of the IT security team manager and Greiblock’ s Executives.b. Perform continuous vulnerability assessment scans on all network assets.c. Only authorized network-based tools are permitted to scan or verify vulnerabilities on thenetwork. d. All employees will cooperate fully with any vulnerability assessment conducted on systems forwhich they are held accountable.e. All employees will cooperate with the IT Security Team in the execution of the remediationplan.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture