Advanced Executive Program in Cybersecurity: Virtual Internship Project Problem Statement
Advanced Executive Program in Cybersecurity: Virtual Internship Project Problem Statement
Problem Statement:
You are working as a security analyst for El Banco Bank, where your primary responsibility is to
implement best practices to secure the organization’s assets.
You are reviewing the password policy for internal users and realize that it is outdated and has
not been updated in the last five years. Therefore, it does not align with the latest
recommendations published by PCI DSS, NIST, and CIS.
The organization currently does not use multi-factor authentication. Users are encouraged to
use password managers authorized by the organization to store passwords.
Your goal is to review and update the organization’s password policy settings to comply with
the latest security requirements. Since the bank processes credit cards, you need to ensure that
the password policy complies with Payment Card Industry Data Security Standard (PCI DSS)
security requirements.
However, PCI DSS encourages referring to other industry standards. Therefore, you have
decided to compare PCI DSS requirements with NIST and CIS recommendations.
El Banco Bank is one of the fastest-growing banks in Europe with more than 1200 branches
across the country and manages €200 billion in assets.
Handling millions of dollars of banking transactions per day, its customers hugely depend upon
the security of their banking data. The recent surge in cyber attacks and data breaches has
become a significant issue for every organization.
According to the latest reports, 81% of successful cyberattacks are due to compromised
usernames or passwords.
Reference Documents: https://github.com/Simplilearn-Edu/AEPCS-Capstone-Project
Expected Deliverables:
TASK 1:
As a security analyst, you have to review the documents published by PCI DSS, NIST, and CIS for
password guidelines and determine the recommendations for the following policy. Use NA (Not
Applicable) if the policy is not explicitly mentioned.
Complexity
(Enabled/Disabled)
Suspend/remove/disable
inactive user accounts
(days)
Review the Password Policy configured in Active Directory and determine if the given default
policy is compliant with the NIST, CIS, and PCI DSS recommendations.
Note: To access the Password Policy, launch the Local Group Policy Editor by pressing
Windows+R, typing gpedit.msc into the box, and then pressing the Enter key. Next, navigate to
Computer configuration > Windows settings > Security settings > Account policies > Password
policy.
Make relevant changes to ensure the password policy settings are compliant with the given
recommendations. Use 0 if the value is NA.
Enforce password
history
Maximum password
age
Minimum password
age
Minimum password
length
Store passwords
using reversible
encryption
TASK 3:
To ensure that the organization’s cloud resources are also compliant with the PCI DSS
requirements, review the IAM Password Policy on AWS (as shown in the screenshot) to
determine if the account password policy meets the PCI DSS requirements.
Make the relevant changes to ensure that the IAM policy is compliant with PCI DSS
requirements.
Requires Symbols
Require Numbers
4. Scan internal and external network vulnerabilities at least ___________ and after any
significant change in the network.
5. Retain visitor logs for at least ___________ unless otherwise restricted by law.
8. Common Vulnerability Scoring System (CVSS) base score for external scans of the
components in the cardholder data environment must not be equal to or higher than
___________.
9. Service providers using segmentation must confirm PCI DSS scope by performing
penetration testing on segmentation controls at least every ___________ and after
making changes to these controls.
11. Perform a risk assessment process at least ___________ and upon significant changes to
the environment that identify critical assets, threats, and vulnerabilities and result in a
formal assessment.
12. Conduct reviews at least ___________ to confirm personnel is following security policies
and operational procedures.