ExamGecko
Question list
Search
Search

Related questions

Question 1022 - CISA discussion

Report
Export

An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?

A.
Hardware configurations
Answers
A.
Hardware configurations
B.
Access control requirements
Answers
B.
Access control requirements
C.
Help desk availability
Answers
C.
Help desk availability
D.
Perimeter network security diagram
Answers
D.
Perimeter network security diagram
Suggested answer: B

Explanation:

The missing access control requirements should present the greatest concern to the IS auditor when reviewing a contract for the outsourcing of IT facilities. Access control requirements are essential for ensuring the confidentiality, integrity, and availability of the outsourced IT resources and data. They specify the roles, responsibilities, and permissions of the outsourcing vendor and its staff, as well as the client and its users, in accessing and managing the IT facilities. They also define the security policies, standards, and procedures that the outsourcing vendor must follow to protect the IT facilities from unauthorized or malicious access, use, modification, or disclosure. Without clear and comprehensive access control requirements, the outsourcing contract may expose the client to significant risks of data breaches, compliance violations, service disruptions, or reputational damage.

Hardware configurations, help desk availability, and perimeter network security diagram are important aspects of an outsourcing contract, but they are not as critical as access control requirements. Hardware configurations describe the technical specifications and performance of the IT equipment that the outsourcing vendor will provide and maintain. Help desk availability defines the service levels and support channels that the outsourcing vendor will offer to the client and its users. Perimeter network security diagram illustrates the network architecture and security measures that the outsourcing vendor will implement to protect the IT facilities from external threats. These aspects can be verified or modified during the implementation or operation phases of the outsourcing contract, but access control requirements need to be established and agreed upon before signing the contract.

ISACA, CISA Review Manual, 27th Edition, Chapter 5: Protection of Information Assets, Section 5.3: Logical Access1

CIO.com, 7 tips for managing an IT outsourcing contract2

Brainhub.eu, 8 Tips for Managing an IT Outsourcing Contract

asked 18/09/2024
JR Gee
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first