ExamGecko
Question list
Search
Search

Related questions

Question 19 - CISA discussion

Report
Export

When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:

A.
a risk management process.
Answers
A.
a risk management process.
B.
an information security framework.
Answers
B.
an information security framework.
C.
past information security incidents.
Answers
C.
past information security incidents.
D.
industry best practices.
Answers
D.
industry best practices.
Suggested answer: A

Explanation:

Information security policies are high-level statements that define the organization's approach to protecting its information assets from threats and risks. They should be based primarily on a risk management process, which is a systematic method of identifying, analyzing, evaluating, treating, and monitoring information security risks. A risk management process can help ensure that the policies are aligned with the organization's risk appetite, business objectives, legal and regulatory requirements, and stakeholder expectations. An information security framework is a set of standards, guidelines, and best practices that provide a structure for implementing information security policies. It can support the risk management process, but it is not the primary basis for defining the policies. Past information security incidents and industry best practices can also provide valuable inputs for defining the policies, but they are not sufficient to address the organization's specific context and needs.Reference:Insights and Expertise,CISA Review Manual (Digital Version)

asked 18/09/2024
Unai M
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first