Chad Nelley - Cyber Security Operations & Leadership
  • Home
  • About
  • OPS Portfolio
    • Early Career
    • Core Career
    • Nelley Consulting, LLC
    • Boards & Non-Profit Experience
  • CS Portfolio
    • Cybersecurity Fundamentals
    • Cryptography
    • Security Architecture >
      • Conceptual Security Architecture
      • Logical Security Architecture
      • Physical Security Architecture
      • Component Security Architecture
      • Governance & CS Operations
    • Operational Policy >
      • Policy Charter & Compliance
      • Mobile & Antivirus Policy
      • Privacy Policy & Classification
    • Risk Management
    • Management & Cybersecurity
    • Secure Software Design & Development
    • Network Visualization
    • Cyber Threat Intelligence
    • Incident Response & Forensics
  • SC Resource Links
    • Cyber Education
    • Industry Resources
    • Cybersecurity News
    • Cyber Economic Development
    • Cryptography Links
    • Security Architecture Links
    • Operational Policy Links
    • Risk Management Links
    • Management & Cybersecurity Links
    • Secure Software Design & Development Links
    • Network Visualization & Vulnerability Links
    • Cyber Threat Intelligence Links
    • Incident Response & Forensics Links
  • Contact
  • Home
  • About
  • OPS Portfolio
    • Early Career
    • Core Career
    • Nelley Consulting, LLC
    • Boards & Non-Profit Experience
  • CS Portfolio
    • Cybersecurity Fundamentals
    • Cryptography
    • Security Architecture >
      • Conceptual Security Architecture
      • Logical Security Architecture
      • Physical Security Architecture
      • Component Security Architecture
      • Governance & CS Operations
    • Operational Policy >
      • Policy Charter & Compliance
      • Mobile & Antivirus Policy
      • Privacy Policy & Classification
    • Risk Management
    • Management & Cybersecurity
    • Secure Software Design & Development
    • Network Visualization
    • Cyber Threat Intelligence
    • Incident Response & Forensics
  • SC Resource Links
    • Cyber Education
    • Industry Resources
    • Cybersecurity News
    • Cyber Economic Development
    • Cryptography Links
    • Security Architecture Links
    • Operational Policy Links
    • Risk Management Links
    • Management & Cybersecurity Links
    • Secure Software Design & Development Links
    • Network Visualization & Vulnerability Links
    • Cyber Threat Intelligence Links
    • Incident Response & Forensics Links
  • Contact

Cyber Fundamentals - Building Blocks

In this section, I present two foundational tools essential for developing a secure environment from a planning perspective. The first is a straightforward Access Control matrix, which serves as a fundamental framework for managing permissions and access. This matrix allows you to define access levels and role-based permissions that align with your organization's specific role definitions.

Following the matrix, I offer a draft security plan document. This sample outline provides a structured approach to developing your security policies and procedures. It serves as an essential starting point for shaping your security posture, ensuring that every system, network, subnet, and environment you build is underpinned by robust and clearly defined access controls.
​
Together, these tools are vital for establishing a strong foundation for your security infrastructure. They encourage a disciplined approach to security, emphasizing the importance of role-based access and comprehensive policy documentation. Below, you will find examples of both the Access Control matrix and the draft security plan to guide your efforts.
​

access_control_matrix_publish.xlsx
File Size: 103 kb
File Type: xlsx
Download File

security_posture_strat_plan_outline.docx
File Size: 31 kb
File Type: docx
Download File

Proudly powered by Weebly