Monitoring and Securing the DFI Environment
Connecting, Reporting and Analysis
Criteria | Meet Specification |
---|---|
The student will demonstrate an understanding of connecting and navigating inside the provided computing environment. |
|
The student will demonstrate an understanding of the NIST Framework, Defense-in-Depth and documentation from Microsoft by performing an analysis of the security configuration on the servers provided. |
|
The student will demonstrate an understanding of the appropriate encryption for data in transit. |
|
Automation is only discussed, not implemented. The students will be able to recommend at a very high level what should be automated and how. |
|
Understanding the needs of the organization (vis-a-vis the server configuration) with what is needed via NIST 800-43 and Microsoft's Security Update Guide the student will select the appropriate updates for install. |
|
Firewalls and IDS Configuration
Criteria | Meet Specification |
---|---|
The students will demonstrate a basic understanding of firewall concepts and how to craft a simple firewall rule. |
|
The students will demonstrate a basic understanding of IDS concepts and how to craft simple IDS rules. |
|
Students will demonstrate a basic understanding of how to appropriately mitigate a threat via firewall alerts. |
|
Encryption, Hashes and Linux
Criteria | Meet Specification |
---|---|
Students will demonstrate the ability to ensure executables are legitimate by comparing file hash with a known good copy or with a hash provided in advance. |
|
Students will demonstrate an understanding of how to log certain events, in this case, failed RDP attempts. |
|
Students will demonstrate an understanding of Linux permissions by creating a directory and then assigning appropriate permissions. |
|
Students will produce a narrative 'status report' that will tie all of the projects together in the form of a report to management. |
|
Demonstrate encrypting a directory. |
|
Tips to make your project standout:
- When recommending automations, expand your recommendations beyond the areas explicitly listed.
- When reviewing Windows permissions suggest ways to streamline and centralize the ability to secure systems.
- In addition to reviewing failed RDP logins, include other recommendations using Syslog or a SIEM to centralize log aggregation. You'll need to provide explanations about why that should be considered.
- For your final report, provide a clear, thoughtful explanation understanding of the work that was performed and how it contributes to the organization.