Description
This is the discussion, attached is the assignment. Thanks!
Week 7 Discussion
"Security Challenges"
- Distributed applications and cloud computing have become a viable option within the LAN-to-WAN Domain. Discuss the primary challenges related to maintaining the security of both applications and data in such an environment.
- Describe the controls that are needed to ensure the security of distributed applications and data. Identify the auditing approach that you believe is best suited to this arrangement. Provide a rationale for your response.
Unformatted Attachment Preview
Purchase answer to see full attachment

Explanation & Answer

Attached.
Running head: LAN/WAN COMPLIANCE AND AUDITING
Worksheet 4: LAN/WAN Compliance and Auditing
Name:
Course:
Professor:
Date:
1
LAN/WAN COMPLIANCE AND AUDITING
2
From the Access Control (AC) family of the NIST 800-53A, select three controls you would
recommend be implemented.
Control
AC-1
Definition
Access control Policy and Procedures
Why Chosen
Tidewater LLC should develop an
essential access control policy that
addresses
the
responsibilities
scope,
of
roles
and
employees,
management commitment, coordination
in the organization’s operations and
compliance. This policy can be used by
the
company’s
organization
to
determine their specific roles.
AC-
Account Management
2(7).1
This control can be used to identify the
necessary approaches that can be taken
when privileged role assignments are no
longer appropriate
AC-3(3)
Access Enforcement
This control defines that policies that the
company can use to enact mandatory
access controls of various users to
improve security in the platform.
LAN/WAN COMPLIANCE AND AUDITING
3
From the Security Awareness and Training Policy and Pro...
