ExamGecko
Question list
Search
Search

Question 108 - CISM discussion

Report
Export

An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?

A.
Enforce the policy.
Answers
A.
Enforce the policy.
B.
Modify the policy.
Answers
B.
Modify the policy.
C.
Present the risk to senior management.
Answers
C.
Present the risk to senior management.
D.
Create an exception for the deviation.
Answers
D.
Create an exception for the deviation.
Suggested answer: C

Explanation:

The information security manager's best course of action is to present the risk to senior management, because this is a case of conflicting objectives and priorities between the information security team and the business management. The information security manager should explain the potential impact and likelihood of a security breach due to the violation of the access policy, as well as the possible legal, regulatory, and reputational consequences. The information security manager should also provide alternative solutions that can achieve both operational efficiency and security compliance, such as implementing single sign-on, role-based access control, or multi-factor authentication. The information security manager should not enforce the policy without senior management's approval, because this could cause operational disruption and business dissatisfaction. The information security manager should not modify the policy without a proper risk assessment and approval process, because this could weaken the security posture and expose the organization to more threats. The information security manager should not create an exception for the deviation without a formal risk acceptance and documentation process, because this could create inconsistency and ambiguity in the policy enforcement and accountability.Reference= CISM Review Manual, 16th Edition, ISACA, 2021, pages 127-128, 138-139, 143-144.

asked 01/10/2024
carlos soto
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first