ExamGecko
Question list
Search
Search

Question 172 - CISM discussion

Report
Export

To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:

A.
security metrics are included in the service level agreement (SLA).
Answers
A.
security metrics are included in the service level agreement (SLA).
B.
contract clauses comply with the organization's information security policy.
Answers
B.
contract clauses comply with the organization's information security policy.
C.
the information security policy of the third-party service provider is reviewed.
Answers
C.
the information security policy of the third-party service provider is reviewed.
D.
right to audit is included in the service level agreement (SLA).
Answers
D.
right to audit is included in the service level agreement (SLA).
Suggested answer: D

Explanation:

= To confirm that a third-party provider complies with an organization's information security requirements, it is most important to ensure that the right to audit is included in the service level agreement (SLA), which is a contract that defines the scope, quality, and terms of the services that the third-party provider delivers to the organization. The right to audit is a clause that grants the organization the authority and opportunity to inspect and verify the third-party provider's security policies, procedures, controls, and performance, either by itself or by an independent auditor, at any time during the contract period or after a security incident. The right to audit can help to ensure that the third-party provider adheres to the organization's information security requirements, as well as to the legal and regulatory standards and obligations, and that the organization can monitor and measure the security risks and issues that arise from the outsourcing relationship. The right to audit can also help to identify and address any gaps, weaknesses, or errors that could compromise the security of the information assets and systems that are shared, stored, or processed by the third-party provider, and to provide feedback and recommendations for improvement and optimization of the security posture and performance.

Security metrics, contract clauses, and the information security policy of the third-party provider are all important elements of ensuring the compliance of the third-party provider with the organization's information security requirements, but they are not the most important ones. Security metrics are quantitative and qualitative measures that indicate the effectiveness and efficiency of the security controls and processes that the third-party provider implements and reports to the organization, such as the number of security incidents, the time to resolve them, the level of customer satisfaction, or the compliance rate. Security metrics can help to evaluate and compare the security performance and outcomes of the third-party provider, as well as to identify and address any deviations or discrepancies from the expected or agreed levels. Contract clauses are legal and contractual terms and conditions that bind the third-party provider to the organization's information security requirements, such as the confidentiality, integrity, and availability of the information assets and systems, the roles and responsibilities of the parties, the liabilities and penalties for breach or violation, or the dispute resolution mechanisms. Contract clauses can help to enforce and protect the organization's information security interests and rights, as well as to prevent or resolve any conflicts or issues that arise from the outsourcing relationship. The information security policy of the third-party provider is a document that defines and communicates the third-party provider's security vision, mission, objectives, and principles, as well as the security roles, responsibilities, and rules that apply to the third-party provider's staff, customers, and partners.The information security policy of the third-party provider can help to ensure that the third-party provider has a clear and consistent security direction and guidance, as well as to align and integrate the third-party provider's security practices and culture with the organization's security expectations and requirements.Reference= CISM Review Manual 15th Edition, pages 57-581; CISM Practice Quiz, question 1662

asked 01/10/2024
Michael Crowson
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first