









Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
D490 Cybersecurity Graduate Capstone Task 2 Western Governors University
Typology: Exams
1 / 15
This page cannot be seen from the preview
Don't miss anything!
Security Problem Under Investigation Warrenton Oil Company is a medium-sized company that provides multiple services to the consumer. Fuel Transportation is their primary means of revenue, in which they have over 100 vehicles and drivers to deliver fuel products to a multitude of vendors across central and east central Missouri, with a few stops into western Illinois. The currently own 55 convenience stores, with plans to acquire 10 more through the buyout of an existing chain. And lastly, they own 3 different hotels in the area. In total, they have over 1,000 employees across each functional area of their business model. Warrenton Oil Company, at its corporate office, currently utilizes a Windows Server Domain to incorporate all network security policies. The servers that are currently in place as the Primary Domain Controller (PDC) and Backup Domain Controller (BDC) are housed in outdated server hardware, and are running out of compliance Operating Systems (OS) of Small Business Server 2003 and Windows Server
As with all Cyber Security related issues, it is 90% human and 10% technical error that makes up most incidents. The key stakeholders now understand the immense importance of not only having a solid security incident response plan in place, but hardware and software components that secure the network from attacks. The security needs of the organization are also required by the PCI-DSS, as we sell directly out of our warehouse and not only from the convenience stores. PCI-DSS determines the requirements for a safe network for processing payment card data (https://www.pcisecuritystandards.org/wp- content/uploads/2022/05/Small_Merchant_Guide_to_Safe_Payments.pdf).
The following personnel are key stakeholders in this project:
IT Solution The proposed solution to resolve the current issues in Warrenton Oil Company’s Cyber Security landscape are relatively simple, as it mostly pertains to a few pieces of physical hardware, and quite a few virtualized machines that make the back-office software operate efficiently and seamlessly to the end users. The replacement of these devices will provide greater throughput, increasing the speed in which data is transported, modified, and stored. It will also provide an OS that does not contain vulnerabilities which cannot be mitigated using a traditional patch management and change management principles. Most importantly, this solution will prevent attackers from exploiting the multitude of vulnerabilities inherent to the current OS’s that are running the domain environment, greatly increasing overall network security, and decreasing the attack surface vector. The Domain Controller Transition provides the following:
Failover redundancy is also a critical business need that will need to be addressed, as sensitive data is present in our environment, and a sufficient DLP will need to be implemented to ensure compliance. This can be achieved through a multitude of options, however, a VMWare HA cluster with Starwind vSAN will be used due to ease of configuration and the unmatched level of technical support offered with the service. Step 2: Assess the Needs of the Organization Assessing the current infrastructure and its dependencies is necessary to ensure the new systems can provide the services needed. This includes the following services, and will require the installation of VMWare eSXI:
Step 3: Select the Right Migration Strategy Typical migration strategies require the installation of the newer Server OS, promotion of the new Server to PDC, movement of FSMO roles to new PDC, and replication of users, computers, printers, etc., onto new PDC. However, this is not a migration, this is a Domain Controller Transition, in which an entirely new domain is being created. This particular strategy comes with its own challenges outside of upgrading. This requires the creation of new Organizational Units (OU’s) within a newly named domain. This is not a downside, however, as it allows me to become more granular with my OU’s than our current environment allows. For example, currently there are 3 copies of the same shared folder in differently labeled drives on the same partition taking up 120GB. I have created the same folder, same name, on the new Domain and have already copied the necessary files over. As only one instance of this share drive is available, and mapped to only a specific OU, I prevent the unauthorized disclosure of data by invoking the principle of least privilege. This strategy allows me to keep all of the necessary data the users need, but control its access at a much higher level, increasing security across the organization. Step 4: Plan the Migration This involves collaboration between me, the IT Director, the Network Technician, and the end users themselves. A typical migration would not involve the end users, as the domain itself would not change, and it would be relatively seamless to them. This migration has quite a few moving parts that need to be addressed so they can be completed efficiently.
With any project, there are inherent risks associated with the implemented changes. This is no different. The primary risk associated with this project is loss of access to data. We currently run a cloud- based backup solution, so loss of data is not a primary concern. However, the environment consists of a file structure that relies heavily on permissions implemented via logon scripts. The removal of the logon scripts prevents any one organization from gaining access to all resources, however, it requires granular configuration at the GPO level. This may cause loss of access to data until the right departments have the right access to the right files when they need it. Additionally, there is risk involved while migrating workstations from one domain to another. Some machines may not like switching domains, which could cause us to have to factory reset some devices. While this doesn’t cause loss of access for the user on the workstation, it does present the risk of data availability for the external entities who also need the data.
This project does not make any significant changes to the user experience. The end users will not know they are on a new domain, aside from seeing an increased speed while accessing certain network resources. Therefore, no specific training is required to ensure that the end users can utilize the systems they did previously, as no visible change will be present. The end users, however, will have to adjust to the new file structure. As stated before, there are several duplicate folders that show up in different shares that are not restricted. In implementing the principle of least privilege, several users will not have access to the same folders they did before. This may cause some immediate pushback from end users, as they are used to a certain method in which they share data. However, principle of least privilege is not a principle the organization is willing to do away with, meaning some individual level training for end users on what they have access to and what they don’t have access to will be required.
The following resources will be required to implement the project:
With any migration, upgrade, replacement, complete overhaul, there must be a method to determine the effectiveness of the project. Typically, there is a quantifiable metric (data transmission speed with networking equipment upgrade, better data with a database upgrade, etc.) that is used to determine how effective the project was at accomplishing its goal. However, as this is a Domain Controller Transition, and a Domain Controller simply processes data, controls machine policies, runs DNS, etc., it becomes more difficult to measure its effectiveness. From a cyber security perspective, it becomes easier to measure this projects effectiveness, as the purpose of the transition is to eliminate inherent vulnerabilities that Small Business Server 2003 has. To measure this projects effectiveness, two items must be present. The results of a vulnerability scan prior to the transition, and the results of a vulnerability scan after the transition has taken place. We will see a dramatic shift in the cyber security landscape towards a secure network, as these vulnerabilities
will no longer be present in our network. This is the quantifiable data that is needed to determine the effectiveness of the transition.
The following will be conducted for testing, analysis, acceptance criteria and determined performance indicators.