ExamGecko
Question list
Search
Search

Related questions











Question 331 - CISA discussion

Report
Export

An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?

A.
The applications are not included in business continuity plans (BCFs)
Answers
A.
The applications are not included in business continuity plans (BCFs)
B.
The applications may not reasonably protect data.
Answers
B.
The applications may not reasonably protect data.
C.
The application purchases did not follow procurement policy.
Answers
C.
The application purchases did not follow procurement policy.
D.
The applications could be modified without advanced notice.
Answers
D.
The applications could be modified without advanced notice.
Suggested answer: B

Explanation:

The greatest risk associated with the situation of business units purchasing cloud-based applications without IT support is that the applications may not reasonably protect data. Cloud-based applications are software applications that run on the internet, rather than on a local device or network.Cloud-based applications offer many benefits, such as scalability, accessibility, and cost-effectiveness, but they also pose many challenges and risks, especially for data security1.

Data security is the process of protecting data from unauthorized access, use, modification, disclosure, or destruction. Data security is essential for ensuring the confidentiality, integrity, and availability of data, as well as complying with legal and regulatory requirements.Data security is especially important for cloud-based applications, as data are stored and processed on remote servers that are owned and managed by third-party cloud service providers (CSPs)2.

When business units purchase cloud-based applications without IT support, they may not be aware of or follow the best practices and standards for data security in the cloud. They may not perform adequate risk assessments, vendor evaluations, contract reviews, or audits to ensure that the CSPs and the applications meet the organization's data security policies and expectations. They may not implement appropriate data encryption, backup, recovery, or disposal methods to protect the data in transit and at rest. They may not monitor or control the access and usage of the data by internal or external users.They may not report or respond to any data breaches or incidents that may occur3.

These actions or inactions may expose the organization's data to various threats and vulnerabilities in the cloud, such as cyberattacks, human errors, malicious insiders, misconfigurations, or legal disputes.These threats and vulnerabilities may result in data loss, leakage, corruption, or compromise, which may have serious consequences for the organization's reputation, operations, performance, compliance, and liability4.

Therefore, it is essential that business units consult and collaborate with IT support before purchasing any cloud-based applications, and follow the organization's guidelines and procedures for cloud security. IT support can help business units to select and use cloud-based applications that are suitable and secure for their needs and objectives.

Top 5 Risks With Cloud Software and How to Mitigate Them4

Mitigate risks and secure your cloud-native applications3

12 Risks, Threats & Vulnerabilities in Moving to the Cloud2

Best Practices to Manage Risks in the Cloud1

asked 18/09/2024
RYAN UBANA
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first