Question: Scenario Part I In Milestone One, you developed a script to create a baseline for newly acquired computer assets. In this project, some of these

Scenario
Part I
In Milestone One, you developed a script to create a baseline for newly acquired computer assets. In this project, some of these assets are
being relocated to a remote location with additional requirements. Develop a script to implement this new baseline configuration to meet the
following requirements:
A. Rename computer to First Initial_Last Name (use your first initial and your last name)
B. Change time zone to the time zone associated with Denver, Colorado
C. Get a list of running processes
D. Set idle lock time for screensaver to 3 minutes
E. Send the output of the last 50 entries in the /var/log/messages log to a text file named "SecurityLog_LastName.txt"
Part II
For this part, you will document the commands to create a CA. As a result of relocation, in addition to the scripts associated with the baseline
hardening, you need to create a new CA for this remote location that meets the following set of security requirements:
A. Hash value = SHA256
B. Key type = AES 256
C. Key length =4096
D. Common Name = CN = Colorado Office Root, C=US, ST-CO,O-your_name-Org
E. Validity period = One Year
Part III
For this part, you will discuss the importance of industry guidelines, organizational baselines, and checklists as they pertain to system and
communication security.
Prompt
You must address the critical elements listed below. Most of the critical elements align with the competencies (shown in brackets).
I. Automated Hardening Scripts: Compose a single executable script to automate hardening tasks to meet the requirements in the
scenario.
a. Screenshot of a single executable script in the Linux shell environment
b. Screenshots that evidence each requirement has been met
c. One of the main reasons that practitioners use automated scripts is to save time by avoiding manual configurations. Describe
additional benefits of using automated scripts for configuring systems in a secure manner for organizations.
II. Certificate Authority:
a. Provide a screenshot of the OpenSSL commands to create a CA with settings that meet the organizational requirements
b. Discuss how to create Certificate Signing Requests (CSRs) for the servers and workstations in the new location and submit to the CA
for approval (CA Applied)
c. Discuss how implementing PKI addresses two of the Fundamental Security Design Principles and how this maintains the tenets of
the confidentiality, integrity, and availability (CIA) triad in an organization
III. Hardening Systems:
a. Discuss how to make the transition from industry guidelines to a baseline that is appropriate for your organization
b. Create an operating system security-configuration checklist representing the elements used in Part I: Automated Hardening Scripts
c. Explain why operating system security-configuration checklists are an important part of the cybersecurity practices in an organization
Scenario Part I In Milestone One, you developed a

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!