100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Otro

D489 DEN1 Task 1: Cybersecurity Management Plan

Puntuación
-
Vendido
1
Páginas
8
Subido en
25-06-2025
Escrito en
2024/2025

This comprehensive cybersecurity management plan addresses the major gaps and vulnerabilities identified in the fictional organization "SAGE Books." The document includes detailed mitigation strategies aligned with PCI DSS and GDPR compliance, security awareness training, role-based responsibilities, and policy development. It outlines improvements needed in incident response, business continuity planning (BCP), and security governance. Students will find detailed examples of policy frameworks, security threat analysis, recovery time objectives (RTOs), and NIST-aligned procedures. This is an ideal reference for WGU D489 students preparing DEN1 Task 1 or anyone looking to understand practical applications of compliance, risk mitigation, and cybersecurity planning.

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
25 de junio de 2025
Número de páginas
8
Escrito en
2024/2025
Tipo
Otro
Personaje
Desconocido

Temas

Vista previa del contenido

DEN1 TASK 1:
CYBERSECURITY
MANAGEMENT PLAN
Dorian Stanfield




6/25/2025
Cybersecurity Management - D489

, A. Summary of Gaps
Per the Independent Security Report, SAGE Books has numerous critical security gaps
within its plaguing its security framework. The organization's present security infrastructure does
not align with industry standards or best practices. The infrastructure also lacks crucial policies
covering AUP, MDM, secrets management, and protection of personally identifiable information
(PII). Additionally, SAGE Books is also noncompliant with PCI DSS, lacking formalized
policies and procedures necessary for managing payment card data securely.
Additional deficiencies exist regarding GDPR compliance. Presently there are no
proactive measures in place to safeguard the personal data of EU citizens, thus failing to meet
GDPR requirements. The organization's security proficiency is also lacking in sufficiency. The
existing team lacks key expert subject matter personnel who are essential for effectively
managing, implementing, and enforcing regulatory compliance.
Security awareness training at SAGE Books is insufficient and is not aligned with
recommended PCI DSS and NIST best practices. Additionally, the Incident Response Plan is
inadequate, lacks clearly defined roles and responsibilities, incident detection handling and
analysis. Lastly, the standing Business Continuity Plan is ineffective, as it fails to thoroughly
address prospective natural disaster scenarios and it also lacks comprehensive recovery
strategies.



B. Mitigation Strategies
To address the security gaps identified in the security report, SAGE Books should employ
several vital mitigation strategies. For starters, the organization must create a comprehensive
security policy aligned with PCI DSS and GDPR best practices. This involves a clear
understanding of the regulatory obligations related to customer data handling. It also involves the
conduction of thorough risk assessments focused on the fortification of cardholders and EU
citizen data, establishing detailed AUP policies, MDM, secure passwords, and personal
identifiable information protection.
Guaranteeing PCI DSS compliance requires numerous actions. SAGE Books must secure
its network through firewalls, ACL’s, security devices, and endpoint protection software. The
organization should also implement system hardening practices, implement robust encryption
methods, maintain asset inventories, and safeguard cardholder data during data in transit.
Moreover, deploying, auditing, and updating antivirus software regularly, alongside instituting a
vulnerability management process, will aid in the identification and remediation of potential
threats swiftly. Access to sensitive information must be strictly regulated based on the principle
of least privilege, employing MFA, and strong cryptographic measures. Systematic scans and
$17.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
dorianstanfield

Conoce al vendedor

Seller avatar
dorianstanfield Western Governers University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
3
Miembro desde
1 año
Número de seguidores
0
Documentos
4
Última venta
3 meses hace

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes