ExamGecko
Question list
Search
Search

Related questions











Question 575 - CISA discussion

Report
Export

A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?

A.
Implement real-time activity monitoring for privileged roles
Answers
A.
Implement real-time activity monitoring for privileged roles
B.
Include the right-to-audit in the vendor contract
Answers
B.
Include the right-to-audit in the vendor contract
C.
Perform a review of privileged roles and responsibilities
Answers
C.
Perform a review of privileged roles and responsibilities
D.
Require the vendor to implement job rotation for privileged roles
Answers
D.
Require the vendor to implement job rotation for privileged roles
Suggested answer: A

Explanation:

A vendor requires privileged access to a key business application. The best recommendation to reduce the risk of data leakage is to implement real-time activity monitoring for privileged roles. This is because real-time activity monitoring can provide visibility and accountability for the actions performed by the vendor with privileged access, such as creating, modifying, deleting, or copying data. Real-time activity monitoring can also enable timely detection and response to any unauthorized or suspicious activities that may indicate data leakage. Including the right-to-audit in the vendor contract is a good practice, but it may not be sufficient to prevent or detect data leakage in a timely manner, as audits are usually performed periodically or on-demand. Performing a review of privileged roles and responsibilities is also a good practice, but it may not address the specific risk of data leakage by the vendor with privileged access. Requiring the vendor to implement job rotation for privileged roles may reduce the risk of collusion or fraud, but it may not prevent or detect data leakage by any individual with privileged access.Reference:CISA Review Manual (Digital Version), [ISACA Privacy Principles and Program Management Guide]

asked 18/09/2024
Steven Owens
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first