ExamGecko
Question list
Search
Search

Related questions











Question 603 - CISA discussion

Report
Export

An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?

A.
The cloud provider's external auditor
Answers
A.
The cloud provider's external auditor
B.
The cloud provider
Answers
B.
The cloud provider
C.
The operating system vendor
Answers
C.
The operating system vendor
D.
The organization
Answers
D.
The organization
Suggested answer: D

Explanation:

The organization is primarily responsible for the security configurations of the deployed application's operating system when migrating its HR application to an Infrastructure as a Service (IaaS) model in a private cloud. This is because in an IaaS model, the cloud provider is responsible for the security of the underlying infrastructure that they lease to their customers, such as servers, storage, and networks, while the customer is responsible for the security of the areas of the cloud infrastructure over which they have control, such as operating systems, middleware, and applications. Therefore, the organization needs to ensure that the operating system is properly configured, patched, hardened, and monitored to protect the HR application from unauthorized access or malicious attacks.

The other options are not primarily responsible for the security configurations of the deployed application's operating system. The cloud provider's external auditor is not responsible for any security configurations, but rather for verifying and reporting on the cloud provider's compliance with relevant standards and regulations. The cloud provider is responsible for the security of the underlying infrastructure, but not for the operating system or any software installed on it by the customer. The operating system vendor is responsible for providing updates and patches for the operating system, but not for configuring or securing it according to the customer's needs.

11: What Is IaaS (Infrastructure As A Service)? - Forbes

12: What is Shared Responsibility Model? - Check Point Software

13: Who Is Responsible for Cloud Security? - Security Intelligence

asked 18/09/2024
Troy Borders
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first