,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
,x. First Attempt |Latest Update with
,x. ,x. ,x. ,x.
,x. Complete Solution. ,x.
THISEXAMCONTAINS:
,x. ,x.
➢ WGU C845 VUN1 Task 1 ,2& 3
,x. ,x. ,x. ,x. ,x. ,x.
➢ Latest Update with Complete Solution
,x. ,x. ,x. ,x.
➢ WGU C845 VUN1 ,x. ,x.
➢ Guaranteed Pass ,x.
, WGU C845 VUN1 Task 1 | Passed on FirstAttempt ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
|LatestUpdatewithCompleteSolution
,x. ,x. ,x. ,x. ,x.
VUN1 — VUN1 Task 1:Managing SecurityOperations and AccessControls
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
Information Systems Security - C845
,x. ,x. ,x. ,x. ,x.
A. ApplyanAccessControlModel .
,x .
,x ,x
. ,x
.
A.1. Chosen Access Control Model , x. ,x. ,x.
I have chosen the Role-Based Access Control (RBAC) model. The principles of RBAC are:
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• RoleAssignment: Auser isassigned to a role basedontheir jobfunction(e.g., "Finance
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
Analyst").
,x.
• Permission Assignment:Permissionstoperformoperations onsystemsareassignedtoroles, not
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
to individual users.
,x. ,x. ,x.
• Session Management: A user activates a role to gain the associated permissions for a session.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• Least Privilege: Usersshouldonlyhave the minimum levelofaccessnecessarytoperform their job
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
duties.
,x.
The organization's access control structure, as seen in the user matrix, is implicitly role-based (e.g.,
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
"Financemanager,""HRcoordinator").ApplyingaformalRBACmodelwouldstreamlinethisbyensuring
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
permissions are strictly tied to business functions, reducing complexity and the potential for user error
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
when assigning permissions.
,x. ,x. ,x.
A.2. Four Misalignments with RBAC Principles , x . , x . , x . , x .
1. Misalignment 1: Privilege Escalation Beyond Role Scope ,x. ,x. ,x. ,x. ,x. ,x.
• Description:The"Juniorsystemadmin"(J.Lopez)has"Domainadmin"privileges.A ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
junior role should not have the highest level of access in a Windows environment.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• Conflictwith RBAC:Thisviolates theprincipleof leastprivilege.The role"Junior system ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
admin"impliesasubsetofadministrativeduties,notunrestricteddomain-widecontrol.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
2. Misalignment 2: Unnecessary Access Across Departments ,x. ,x. ,x. ,x. ,x.
• Description:The "Finance analyst" (L. Cheng) has "Fullaccess" to the CRM, a system ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
, primarily for Sales and Support. A finance role typically does not require full modification
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
rights in a customer relationship system.
,x. ,x. ,x. ,x. ,x. ,x.
• Conflict with RBAC: This violates least privilege and separation of duties. It allows for
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
potential data manipulation outside the user's core business function.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
3. Misalignment 3: Violation of User-Role Assignment Post-Termination
,x. ,x. ,x . ,x. ,x. ,x.
• Description: The "HR assistant" (P. Ellis), who was terminated on 2025-05-20, has an
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
"Active" account status and successfully logged in on 2025-06-29.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• Conflict with RBAC: RBAC requires timely revocation of role assignments upon a change in
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
employment status. An active session for a terminated user completely bypasses the
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
security provided by the role structure.
,x. ,x. ,x. ,x. ,x. ,x.
4. Misalignment 4: Overly Broad Privileged Access
,x. ,x. ,x. ,x. ,x.
• Description: The "IT administrator" (T. Miller) has "Full admin" access to "All internal
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
systems," and the log shows they made a firewall rule change without a ticket_id.
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
• Conflictwith RBAC: While some access is necessary, blanket "Full admin" access
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x.
violates least privilege and impedes accountability. It does not segment duties within the IT
,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. ,x. x,. ,x.
department itself.
,x. ,x.