WGU C845 VUN1Task 1 | Passed on FirstAttempt ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
|Latest Update with Complete Solution
,x. ,x. ,x. ,x. ,x.
VUN1 — VUN1 Task 1: Managing Security Operations and Access Controls
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
Information Systems Security - C845
,x. ,x. ,x. ,x. ,x.
A. Apply an Access Control Model ,x. ,x. ,x. ,x.
A.1. Chosen Access Control Model ,x . ,x. , x.
Ihavechosen the Role-BasedAccess Control (RBAC)model.Theprinciples ofRBAC are:
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• Role Assignment: A user is assigned to a role based on their job function (e.g., "Finance
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
Analyst").
,x.
• Permission Assignment:Permissionstoperformoperations onsystemsareassignedto roles, not
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
to individual users.
,x. ,x. ,x.
• Session Management: Auser activates a role to gainthe associated permissionsfor a session.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• Least Privilege: Users should only have the minimum level of access necessary toperform their job
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
duties.
,x.
The organization's access control structure, as seen in the user matrix, is implicitly role-based (e.g.,
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
"Financemanager," "HRcoordinator"). Applyinga formalRBACmodelwouldstreamlinethisbyensuring
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
permissions are strictly tied to business functions, reducing complexity and the potential for user error
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
when assigning permissions.
,x. ,x. ,x.
A.2. Four Misalignments with RBAC Principles , x . , x . , x . , x .
1. Misalignment 1: Privilege Escalation Beyond Role Scope ,x. ,x. ,x. ,x. ,x. ,x.
• Description: The "Juniorsystem admin" (J.Lopez) has"Domainadmin" privileges.A ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
junior role should not have the highest level of access in a Windows environment.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• Conflict with RBAC: Thisviolates the principle of least privilege. The role "Junior system ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
admin"implies asubsetofadministrativeduties,not unrestricteddomain-widecontrol.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
2. Misalignment 2: Unnecessary Access Across Departments ,x. ,x. ,x. ,x. ,x.
• Description: The "Finance analyst" (L. Cheng) has "Full access" to the CRM, a system ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
, primarily for Sales and Support. A finance role typically does not require full modification
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
rights in a customer relationship system.
,x. ,x. ,x. ,x. ,x. ,x.
• Conflict with RBAC: This violates least privilege and separation of duties. It allows for
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
potential data manipulation outside the user's core business function.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
3. Misalignment 3: Violation of User-Role Assignment Post-Termination
,x. ,x. ,x. ,x. ,x. ,x.
• Description: The "HR assistant" (P. Ellis), who was terminated on 2025-05-20, has an
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
"Active" account status and successfully logged in on 2025-06-29.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• Conflict with RBAC: RBAC requires timely revocation of role assignments upon a change in
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
employment status. An active session for a terminated user completely bypasses the
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
security provided by the role structure.
,x. ,x. ,x. ,x. ,x. ,x.
4. Misalignment 4: Overly Broad Privileged Access
,x. ,x. ,x . ,x. ,x.
• Description: The "IT administrator" (T. Miller) has "Full admin" access to "All internal
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
systems," and the log shows they made a firewall rule change without a ticket_id.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• ConflictwithRBAC:Whilesomeaccessisnecessary,blanket"Fulladmin" access
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
violates least privilege and impedes accountability. It does not segment duties within the IT
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
department itself.
,x. ,x.
|Latest Update with Complete Solution
,x. ,x. ,x. ,x. ,x.
VUN1 — VUN1 Task 1: Managing Security Operations and Access Controls
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
Information Systems Security - C845
,x. ,x. ,x. ,x. ,x.
A. Apply an Access Control Model ,x. ,x. ,x. ,x.
A.1. Chosen Access Control Model ,x . ,x. , x.
Ihavechosen the Role-BasedAccess Control (RBAC)model.Theprinciples ofRBAC are:
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• Role Assignment: A user is assigned to a role based on their job function (e.g., "Finance
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
Analyst").
,x.
• Permission Assignment:Permissionstoperformoperations onsystemsareassignedto roles, not
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
to individual users.
,x. ,x. ,x.
• Session Management: Auser activates a role to gainthe associated permissionsfor a session.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• Least Privilege: Users should only have the minimum level of access necessary toperform their job
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
duties.
,x.
The organization's access control structure, as seen in the user matrix, is implicitly role-based (e.g.,
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
"Financemanager," "HRcoordinator"). Applyinga formalRBACmodelwouldstreamlinethisbyensuring
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
permissions are strictly tied to business functions, reducing complexity and the potential for user error
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
when assigning permissions.
,x. ,x. ,x.
A.2. Four Misalignments with RBAC Principles , x . , x . , x . , x .
1. Misalignment 1: Privilege Escalation Beyond Role Scope ,x. ,x. ,x. ,x. ,x. ,x.
• Description: The "Juniorsystem admin" (J.Lopez) has"Domainadmin" privileges.A ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
junior role should not have the highest level of access in a Windows environment.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• Conflict with RBAC: Thisviolates the principle of least privilege. The role "Junior system ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
admin"implies asubsetofadministrativeduties,not unrestricteddomain-widecontrol.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
2. Misalignment 2: Unnecessary Access Across Departments ,x. ,x. ,x. ,x. ,x.
• Description: The "Finance analyst" (L. Cheng) has "Full access" to the CRM, a system ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
, primarily for Sales and Support. A finance role typically does not require full modification
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
rights in a customer relationship system.
,x. ,x. ,x. ,x. ,x. ,x.
• Conflict with RBAC: This violates least privilege and separation of duties. It allows for
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
potential data manipulation outside the user's core business function.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
3. Misalignment 3: Violation of User-Role Assignment Post-Termination
,x. ,x. ,x. ,x. ,x. ,x.
• Description: The "HR assistant" (P. Ellis), who was terminated on 2025-05-20, has an
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
"Active" account status and successfully logged in on 2025-06-29.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• Conflict with RBAC: RBAC requires timely revocation of role assignments upon a change in
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
employment status. An active session for a terminated user completely bypasses the
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
security provided by the role structure.
,x. ,x. ,x. ,x. ,x. ,x.
4. Misalignment 4: Overly Broad Privileged Access
,x. ,x. ,x . ,x. ,x.
• Description: The "IT administrator" (T. Miller) has "Full admin" access to "All internal
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
systems," and the log shows they made a firewall rule change without a ticket_id.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• ConflictwithRBAC:Whilesomeaccessisnecessary,blanket"Fulladmin" access
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
violates least privilege and impedes accountability. It does not segment duties within the IT
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
department itself.
,x. ,x.