21 Feb In the Week 3 Assignment, you assessed the security vulnerabilities of a business application and how to address them. In last week’s lab, you determined and
In the Week 3 Assignment, you assessed the security vulnerabilities of a business application and how to address them. In last week’s lab, you determined and configured the roles that are needed for application development and deployment. In this assignment, you apply what you have learned by assessing security aspects related to the implementation of your chosen application.
Preparation
Research security-related issues for implementing your chosen software including policies regarding implementation and management as well as integration with an existing system.
Instructions
Do the following:
- Describe the human resources (roles and skills) required to both implement and manage your chosen software effectively. Include the permissions/access configurations for which each role should be provisioned.
- Explain the importance of 3 security policy considerations for integrating the app with existing internal systems.
- Assess how well the application addresses the following areas. Provide specific examples for support.
- Access Control
- Data & personnel isolation
- Zero trust
This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.
The specific course learning outcomes associated with this assignment are:
- Evaluate application technologies and the security issues associated with them.
- Define processes for ensuring web application security.