Audit and Assesment

Hide Assignment Information

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Instructions

You are a network administrator at XYZ, a large, publicly traded healthcare organization. XYZ has 25 sites across the region, 2,000 staff members, and thousands of patients. 

Protecting sensitive customer information is highly important to XYZ management and stakeholders. Due to the nature of business and HIPAA requirements, XYZ is audited regularly. Your manager wants you to identify five critical controls that are typically verified during a compliance audit. The controls should be a part of the 
CIS Security Controls 
(Formerly known as the SANS Critical Security Controls for Effective Cyber Defense).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Based on this organizational scenario, complete the following tasks: 

· Identify five critical security control points throughout the IT infrastructure that must be verified for compliance.

· Formulate a plan to help the organization strengthen the security control points.

Write a report that addresses the tasks above.

Create a new Microsoft Word document using the “Business Paper” template. Insert a cover page, table of contents, and a reference page. Select any theme you desire. Include an introduction, summary sections for your findings and recommendations, and a conclusions section. You must cite your research properly so that your manager may add or refine this report before submission to senior management. Your paper needs to be APA compliant and to contain a minimum of 1400 words in its body section. Please see the enclosed “Sample Project Template x” for an example.

·
Sample Project Template – Word Document 
(46.4 KB)

Table of Contents
Introduction

2

Findings and Recommendations 2
Critical Security Control Points 2
Improvement Plan 2
Conclusion 2
References 3

Introduction

To get started right away, just tap any placeholder text (such as this) and start typing.

Findings and Recommendations

To get started right away, just tap any placeholder text (such as this) and start typing.

Critical Security Control Points

View and edit this document in Word on your computer, tablet, or phone. You can edit text; easily insert content such as pictures, shapes, and tables; and seamlessly save the document to the cloud from Word on your Windows, Mac, Android, or iOS device.

Improvement Plan

View and edit this document in Word on your computer, tablet, or phone. You can edit text; easily insert content such as pictures, shapes, and tables; and seamlessly save the document to the cloud from Word on your Windows, Mac, Android, or iOS device.

Conclusion

To get started right away, just tap any placeholder text (such as this) and start typing.

References

Address | City, St Zip Code

2

Are you stuck with your online class?
Get help from our team of writers!

Order your essay today and save 20% with the discount code RAPID