This project consists of a security audit analysis for the fictional company Botium Toys. Based on a set of documents describing the company's scope, assets, and risk assessment, the objective was to:
- Assess existing security controls.
- Verify compliance with key regulations (PCI DSS, GDPR, SOC).
- Identify vulnerabilities and risks.
- Develop a prioritized plan of recommendations to improve the organization's security posture.
The final report, Controls and compliance checklist.md, consolidates the analysis and the proposed actions.
The analysis and recommendations were based on best practices and requirements from the following frameworks and regulations mentioned in the case study:
- NIST Cybersecurity Framework (CSF)
- Payment Card Industry Data Security Standard (PCI DSS)
- General Data Protection Regulation (GDPR)
- System and Organizations Controls (SOC)
/
βββ 01_Source_Documents/ # Contains the original case study files
β βββ Botium Toys_ Scope, goals, and risk assessment report.pdf
β βββ Control categories.pdf
β βββ Controls and compliance checklist.pdf
β
βββ 02_Final_Report/ # Contains the final report with the analysis and recommendations
β βββ Controls and compliance checklist.md
β
βββ README.md # This file
- Scenario Analysis: Studied the
Botium Toys_ Scope, goals, and risk assessment report.pdfto understand the company's environment, assets, and weaknesses. - Checklist Completion: The
Controls and compliance checklist.pdfwas filled out by marking "Yes" or "No" for each control and compliance practice, based on evidence from the risk report. - Development of Recommendations: Based on the identified gaps (items marked "No"), detailed recommendations were developed.
- Prioritization: The recommendations were prioritized (Immediate, High, Medium) according to their risk level and business impact, resulting in the final report.
The final report proposes 5 key actions to mitigate the identified risks:
- Customer Data Protection and PCI DSS Compliance: Implement access controls (Least Privilege) and encryption.
- Ensuring Business Continuity: Create a Disaster Recovery Plan (DRP) and a backup policy.
- Asset Identification and Classification: Conduct an asset inventory and a Business Impact Analysis (BIA).
- Formalizing Risk Management for Legacy Systems: Create procedures and schedules for maintaining old systems.
- Strengthening Threat Detection and Identity Management: Implement an Intrusion Detection System (IDS) and strengthen password policies.
Diego Sousa de Carvalho