Physical & Environmental Protection policy and Secure System Development Life Cycle Standard

Part 1: Physical and Environmental Protection Policy

Locate and read the Physical and Environmental Protection Policy in the NIST Cybersecurity Framework Policy Template Guide. Research online for a real-world implementation example of the policy and compare it with the NIST policy template side by side.

Answer the following questions clearly and systemically in this Word document. Make sure to include a References section toward the end of the document.

The Physical and Environmental Protection Policy is implemented for which NIST function and sub-categories? [5 points]

Answer:

Which organization is the implementation example you identified for? Which industry sector (e.g., education, government, etc.) is the organization in? [5 points]

Answer:

What is the purpose of the example policy? Which party (parties) does the policy apply to? Who is/are responsible for implementing this policy? [5 points]

Answer:

As compared to the NIST policy template, how is the example policy customized to fit the needs of the organization? Describe three occurrences of customization in detail. [15 points]

Answer:

Part 2: Secure System Development Life Cycle Standard

Locate and read the Secure System Development Life Cycle Standard in the NIST Cybersecurity Framework Policy Template Guide. Research online for a real-world implementation example of the standard/policy and compare it with the NIST policy template side by side.

Answer the following questions clearly and systemically in this Word document. Make sure to include a References section toward the end of the document.

The Secure System Development Life Cycle Standard is implemented for which NIST functions and sub-categories? [5 points]

Answer:

Which organization is the implementation example you identified for? Which industry sector (e.g., education, government, etc.) is the organization in? [5 points]

Answer:

What is the purpose of the example standard/policy? Which party (parties) does the standard/policy apply to? Who is/are responsible for implementing this policy? [5 points]

Answer:

As compared to the NIST policy template, how is the example standard/policy customized to fit the needs of the organization? Describe two occurrences of the customization in detail. [10 points]

Answer:

If specified in the example standard/policy, how frequent is the policy reviewed for potential modifications? If not specified in the example standard/policy, what are your recommendations? [5 points]

Answer:

References

1.
2.
3. 

I think what my Prof is looking for is less is more? Please view the example below? 
From my Professor: 
This is not that difficult, just note the following: The correct answers are: Part 1: Security Awareness and Training Policy Answer: ID.AM & PR.AT Function: Identify & Protect Sub-category: ID.AM-1, ID.AM-2, ID.AM-6 & PR.AT-1 (Policy Template Guide – CIS Center for Internet Security 2021) Part 2:Contingency Planning Policy Recover: Recovery Planning (RC.RP) RC.RP-1 Recovery plan is executed during or after a cybersecurity incident. Recover: Improvements (RC.IM) RC.IM-1 Recovery plans incorporate lessons learned. RC.IM-2 Recovery strategies are updated. 

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.