Produce a report on the underlying information and security technologies – systems and networks, – other aspects, and their compliance with PCIDSS, CIS CSCs best practices, and GDPR.

Task A Small Business Security Project

Task:
Your part of developing the solution is to produce a report on the underlying information and security technologies systems and networks, other aspects, and their compliance with PCIDSS, CIS CSCs best practices, and GDPR.

This will then feed back into a larger study, including costings, that GFS will produce internally to be used to further pursue the business opportunity.

Complete a report that comprises the following parts:
1. Design Outline (20%)

Assessment Brief 4
2. Threat (10%)

3. Compliance with PCI-DSS Requirements (30%)

4. CIS Critical Security Controls (v8) (20%)

5. Compliance with GDPR (10%)

6. Conclusions and Recommendations (10%)

Each part may have subsections, which should be suitably named. Numbering of sections and subsections is encouraged for better navigation and in-document referencing.

Do not repeat. Use forward and backward references within your document where appropriate to indicate where related matters are covered.

Consider throughout, best practices relating to:
Intrusion Detection and Prevention, including firewalls

Access Control and Management

Security in transit and in storage

Backups and Business Continuity planning

Key management and access


…this list is not exhaustive.

Design Outline (20%)

Design and architect a payment system for GFS to cover the 3 sites.

List and detail the technologies and solutions that you would choose.

Present a logical connectivity/network diagram that covers the 3 sites and detail how it would operate. More than one diagram might be useful to show different aspects without crowding one diagram.

Threat (10%)
What are the main threats against this solution, including the risk to information? Reference external sources which indicate the most likely threats against this sort of business.
Compliance with PCI-DSS (30%)

Detail what is required, technically and non-technically (each where there is an appropriate response) for each of the 12 PCI-DSS requirements. Where useful, use of diagrams and/or figures is encouraged.

CIS Critical Security Controls (20%)

There are 56 Safeguards (Sub-Controls’) for CIS CSC Implementation Group 1 (IG1) which are known as providing basic cyber hygiene against the most common attacks.

For each CIS Critical Security Control which has a IG1 Safeguard, briefly detail a solution. Address at least one IG1 Safeguard per control.

Assessment Brief 5
Notes: Use CIS Controls version 8. Only 15 of the 18 CSCs have an IG1 Safeguard.

Compliance with GDPR (10%)

Identify and detail how the solution will be compliant with GDPR.

Produce a report on the underlying information and security technologies – systems and networks, – other aspects, and their compliance with PCIDSS, CIS CSCs best practices, and GDPR.
Scroll to top