Assignment:
Purpose
This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies.
Learning Objectives and Outcomes
Successful completion of this project will ensure that you can develop draft IT security policies for an organization and apply learning constructs from the course. By the end of this project, you will be able to do the following:
1. Evaluate compliance laws relevant to the U.S. Department of Defense.
2. Assess policy frameworks appropriate for an organization in a given scenario.
3. Evaluate security controls and standards for the seven domains of a typical IT infrastructure.
4. Develop DoD-compliant policies for an organization's IT infrastructure.
Required Source Information and Tools
Web References: Links to Web references in this document and related materials are subject to change without prior notice. These links were last verified on August 26, 2020.
The following tools and resources will be needed to complete this project:
Course textbook
Internet access
DoD instructions or directives
Risk Management Framework (RMF) for DoD Information Technology (IT)
U.S. Department of Defense (DoD) Chief Information Office Library
Department of Defense Information Security Program
Department of Defense Internet Services and Internet-Based Capabilities
You may consult other relevant sources, if needed. If so, include citations for those sources in the final deliverable for this report.