Project page

Information Assurance Plan

NIST-aligned governance, access control, monitoring, response, and continuity planning

Project snapshot

This project establishes a structured information assurance plan to protect confidentiality, integrity, and availability across an organization facing modern cyber threats. I framed the plan around real operational needs: access control consistency, logging visibility, defined response roles, and repeatable maintenance.

Operational security and policy illustration

IT Support Impact Summary

Translated security governance requirements into practical access control, logging, and incident response processes that support consistent user management, clearer troubleshooting, and reliable escalation paths.

This project establishes a structured information assurance plan to protect confidentiality, integrity, and availability across an organization facing modern cyber threats. I framed the plan around real operational needs: access control consistency, logging visibility, defined response roles, and repeatable maintenance.

My role

Defined risk priorities, mapped governance requirements to operational controls, and documented how IT, leadership, and users should respond to incidents and continuity events.

IT support relevance

Shows awareness of account lifecycle management, troubleshooting through logging, procedure-driven escalation, and how support teams fit into a secure operating model.

Control-to-implementation mapping

Control areaPractical implementationSupport value
Access controlLeast privilege, formal reviews, multi-factor authenticationReduces permission drift and makes access changes more consistent
Logging and monitoringCentralized event visibility and reviewImproves troubleshooting and helps identify incidents earlier
Incident responseDefined reporting, escalation, containment, and recovery stepsSupports predictable handoff and faster response under pressure
Disaster recoveryBackups, testing, and recovery validationImproves service continuity and restoration confidence

Major weaknesses identified

High-priority recommendations

What this proves

I think this project shows that I can translate policy into operational reality. Instead of treating governance as paperwork, I used it to define better access handling, stronger logging, clearer incident workflows, and more dependable support processes.