Posted: December 9th, 2022
Submit a draft of DoD-compliant policies, standards, and controls that affect the User, Workstation, LAN, and LAN-to-WAN Domains.
You work for a high-tech company with approximately 390 employees. Your firm recently won a large DoD contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.
This course project will require you to form a team of 2 to 3 coworkers (fellow students) and develop the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the “Tasks” section below). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies or controls in place.
Your firm’s computing environment includes the following:
12 servers running Microsoft Server 2012 R2, providing the following:
Active Directory (AD)
Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
Enterprise Resource Planning (ERP) application (Oracle)
A Research and Development (R&D) Engineering network segment for testing, separate from the production environment
Microsoft Exchange Server for e-mail
Symantec e-mail filter
Websense for Internet use
Two Linux servers running Apache Server to host your Web site
390 PCs/laptops running Microsoft Windows 7 or Windows 8, Microsoft Office 2013, Microsoft Visio, Microsoft Project, and Adobe Reader
Create policies that are DoD compliant for the organization’s IT infrastructure.
Develop a list of compliance laws required for DoD contracts.
List controls placed on domains in the IT infrastructure.
List required standards for all devices, categorized by IT domain.
Develop a deployment plan for implementation of these polices, standards, and controls.
List all applicable DoD frameworks in the final delivery document.
Write a professional report that includes all of the above content-related items.
Although the final project report is due at the end of the course, it is recommended that you complete it at least a week early so you have more time to study for the final exam.
· Format: Microsoft Word
· Font: Arial, Size 12, Double-Space
· Citation Style: Your school’s preferred style guide
· Length: 2–3 pages
I developed a list of compliance laws required for DoD contracts.
I listed controls placed on domains in the IT infrastructure.
I listed required standards for all devices, categorized by IT domain.
I developed DoD policies and standards for our organization’s IT infrastructure.
I developed a deployment plan for implementation of these polices, standards, and controls.
I listed all applicable DoD frameworks in the final report.
I involved myself in each of the lessons and asked my instructor questions.
I found additional references/resources than those provided.
I created an academic paper describing the policies, standards, and controls that would make our organization DoD compliant.
I submitted my work per the deliverable timeline to the instructor for monitoring and comment.
Running head: COMPANY xxxxxx Department of Defense (DoD) Ready 1
COMPANY xxxxxx DoD Ready 4
Company xxxxxx Department of Defense (DoD) Ready
Group Project #
The University of Cumberlands
An abstract is a single paragraph, without indentation, that summarizes the key points of the manuscript in 150 to 250 words. The purpose of the abstract is to provide the reader with a brief overview of the paper. This template is based on 6thed of the Publication manual of the American Psychological Association.
Note: an abstract is only required if the assignment calls for it. Consult with your instructor.
Step 1: Select an organization.
The organization you select can be your employer, a fictitious organization, or a city government.
Step 2: Create an executive summary.
Provide background information (such as a business model, number of employees, or a determination of growth stage) and an overview of the current IT strategic planning process. Answer the following:
· What are the objectives of the IT security policy?
· How was the policy developed?
· How long is the policy valid?
Step 3: Conduct a research of DoD-specific requirement for an Organization IT infrastructure and US compliance laws that may affect them
· State the organizational mission and vision.
· Identify the organizational IT Infrastructure
· Identify specific DoD Requirement for the infrastructure (Detail research, Use APA citations)
· Identify the US compliance laws that may affect the organization(Detail Research , Use APA citations and references)
Step 4: Policies, Standards and Controls(Users, Workstation, LAN, LAN-to-WAN)
4.1.0 Acceptable use policy (Introduction, Purpose, Scope, Policy)
4.1.3 Policies (Examples of policies to develop: General Use and ownership, Security and Proprietary Information, Unacceptable Use, System and Network Activities)
Workstation Policy, standard, Controls
4.3.3 LAN Policy, Standard, Controls
Do same as above……….
Phase 3 (10-13-2019)
Step 6: Policies, Standards and Controls (WAN, Remote Access , System Application Domains )
4.4.2 Purpose ….
4.5 Remote access
4.6 System Application
Step 7: Conclusion
· Summarize the planning and execution process Develop a deployment plan for implementation of these polices, standards, and controls Include all applicable DoD frameworks
Minimum of 5 references
Place an order in 3 easy steps. Takes less than 5 mins.