Question: Refer to the most recent LastPass hack (Read it here: LastPass users: Your info and password vault data are now in hackers hands | Ars

Refer to the most recent LastPass hack (Read it here: LastPass users: Your info and password vault data are now in hackers hands | Ars Technica When hackers stole customers password vaults, they got access to both encrypted (usernames and passwords) and unencrypted data (websites). It is important to maintain confidentiality of data in storage. Refer to the CIS controls (v-8) to maintain confidentiality of data in storage. Files List two technical controls that you will implement to ensure the above List one issue-specific policy that you will need to ensure the above Clearly state the policy statement, authorized access and use, prohibited use, system management and update, violation of policy, and policy update frequency List one system-specific policy that you will need to ensure the above Clearly state the policy statement, authorized access and use, prohibited use, system management and update, violation of policy, and policy update frequency for the specified system Format of the report: Executive summary: Provide 3 to 4 bullet points of the most important suggestions Introduction: Provide a brief context to the problem. In this case: why do you want to maintain confidentiality of data in storage, who are the beneficiaries/constituents, and what harm will the organization endure if confidentiality of data is not maintained. Implementing controls List two technical controls (refer to CIS control v8) Discuss the rationale behind you selection, and outline how these controls will ensure confidentiality of data in storage Policy formulation 1. List one issue-specific policy 1. Policy statement 2. Authorized access of use 3. Prohibited use 4. Violation of policy 5. Frequency of update 2. List one system-specific policy 1. Policy statement 2. Authorized access of use 3. Prohibited use 4. system management 5. Violation of policy 6. Frequency of update

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

The question youve provided is incomplete in that it references needing to read a specific article LastPass users Your info and password vault data are now in hackers hands Ars Technica which is cruci... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!