In this activity, I will assess the access controls used by a business. I’ll analyze their current process, identify issues, and make recommendations to improve their security practices.
Previously, I learned that access controls are security controls that manage access, authorization, and accountability of information. Authentication controls verify who someone is, whereas authorization controls grant a user permissions and set limits on what they’re allowed to do. When done well, access controls are the key to decreasing the likelihood of a security risk.
I must complete this worksheet before moving on. The next course item will provide me with a completed exemplar to compare against my own work.
I’m the first cybersecurity professional hired by a growing business. Recently, a deposit was made from the business to an unknown bank account. The finance manager says they didn’t make a mistake. Fortunately, they were able to stop the payment. The owner has asked me to investigate what happened to prevent any future incidents.
To do this, I need to perform some accounting on the incident to better understand what occurred. First, I will review the access log of the incident. Next, I will take notes that can help me identify a possible threat actor. Then, I will spot issues with the access controls that were exploited by the user. Finally, I will recommend mitigations that can improve the business’s access controls and reduce the likelihood that this incident reoccurs.
Note(s) | Issue(s) | Recommendation(s) | |
---|---|---|---|
Authorization / Authentication |
|
|
|
By completing this worksheet, I have captured key event details, identified access control issues, and proposed actionable recommendations to prevent future incidents. Implementing role‐based controls, enforcing MFA, and setting up alerting will strengthen the business’s security posture.