Question: Scenario Part I In Milestone One, you developed a script to create a baseline for newly acquired computer assets. In this project, some of these
Scenario
Part I
In Milestone One, you developed a script to create a baseline for newly acquired computer assets. In this project, some of these assets are
being relocated to a remote location with additional requirements. Develop a script to implement this new baseline configuration to meet the
following requirements:
A Rename computer to First InitialLast Name use your first initial and your last name
B Change time zone to the time zone associated with Denver, Colorado
C Get a list of running processes
D Set idle lock time for screensaver to minutes
E Send the output of the last entries in the varlogmessages log to a text file named "SecurityLogLastName.txt
Part II
For this part, you will document the commands to create a CA As a result of relocation, in addition to the scripts associated with the baseline
hardening, you need to create a new CA for this remote location that meets the following set of security requirements:
A Hash value SHA
B Key type AES
C Key length
D Common Name CN Colorado Office Root, CUS STCOOyournameOrg
E Validity period One Year
Part III
For this part, you will discuss the importance of industry guidelines, organizational baselines, and checklists as they pertain to system and
communication security.
Prompt
You must address the critical elements listed below. Most of the critical elements align with the competencies shown in brackets
I. Automated Hardening Scripts: Compose a single executable script to automate hardening tasks to meet the requirements in the
scenario.
a Screenshot of a single executable script in the Linux shell environment
b Screenshots that evidence each requirement has been met
c One of the main reasons that practitioners use automated scripts is to save time by avoiding manual configurations. Describe
additional benefits of using automated scripts for configuring systems in a secure manner for organizations.
II Certificate Authority:
a Provide a screenshot of the OpenSSL commands to create a CA with settings that meet the organizational requirements
b Discuss how to create Certificate Signing Requests CSRs for the servers and workstations in the new location and submit to the CA
for approval CA Applied
c Discuss how implementing PKI addresses two of the Fundamental Security Design Principles and how this maintains the tenets of
the confidentiality, integrity, and availability CIA triad in an organization
III. Hardening Systems:
a Discuss how to make the transition from industry guidelines to a baseline that is appropriate for your organization
b Create an operating system securityconfiguration checklist representing the elements used in Part I: Automated Hardening Scripts
c Explain why operating system securityconfiguration checklists are an important part of the cybersecurity practices in an organization
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
