Database Security Assessment
You are a contracting officer’s technical representative, a security system engineer, at a military hospital. Your department’s leaders are adopting a new medical health care database management system. And they’ve tasked you to create a request for proposal for which different vendors will compete to build and provide to the hospital.
A request for proposal, or RFP, is when an organization sends out a request for estimates on performing a function, delivering a technology, or providing a service or augmenting staff. RFPs are tailored to each endeavor but have common components and are important in the world of IT contracting and for procurement and acquisitions.
To complete the RFP, you must determine the technical and security specifications for the system. You’ll write the requirements for the overall system and also provide evaluation standards that will be used in rating the vendor’s performance. Your learning will help you determine your system’s requirements.
As you discover methods of attack, you’ll write prevention and remediation requirements for the vendor to perform. You must identify the different vulnerabilities the database should be hardened against.
- An RFP, about 10 to 12 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report.
- An MS-Excel spreadsheet with lab results.
There are 11 steps in this project. You will begin with the workplace scenario and continue with Step 1: “Provide an Overview for Vendors.
“Modern health care systems incorporate databases for effective and efficient management of patient health care. Databases are vulnerable to cyberattacks and must be designed and built with security controls from the beginning of the life cycle.
Although hardening the database early in the life cycle is better, security is often incorporated after deployment, forcing hospital and health care IT professionals to play catch-up. Database security requirements should be defined at the requirements stage of acquisition and procurement.
System security engineers and other acquisition personnel can effectively assist vendors in building better health care database systems by specifying security requirements up front within the request for proposal (RFP). In this project, you will be developing an RFP for a new medical health care database management system.
Parts of your deliverables will be developed through your learning lab. You will submit the following deliverables for this project
:Start HereStep 1: Provide an Overview for Vendors
Step 2: Provide Context for the Work
Step 3: Provide Vendor Security Standards
Step 4: Describe Defense Models
Step 5: Explore Database Defensive Methods
Step 6: Provide a Requirement Statement for System Structure
Step 7: Provide Operating System Security Components
Step 8: Write Requirements for Multiple Independent Levels of Security
Step 9: Include Access Control Concepts, Capabilities
Step 10: Include Test Plan Requirements