ExamGecko
Question list
Search
Search

Question 185 - CISM discussion

Report
Export

Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?

A.
Verify that information security requirements are included in the contract.
Answers
A.
Verify that information security requirements are included in the contract.
B.
Request customer references from the vendor.
Answers
B.
Request customer references from the vendor.
C.
Require vendors to complete information security questionnaires.
Answers
C.
Require vendors to complete information security questionnaires.
D.
Review the results of the vendor's independent control reports.
Answers
D.
Review the results of the vendor's independent control reports.
Suggested answer: D

Explanation:

Reviewing the results of the vendor's independent control reports is the best way to assess the risk associated with using a SaaS vendor because it provides an objective and reliable evaluation of the vendor's security controls and practices. Independent control reports, such as SOC 2 or ISO 27001, are conducted by third-party auditors who verify the vendor's compliance with industry standards and best practices. These reports can help the customer identify any gaps or weaknesses in the vendor's security posture and determine the level of assurance and trust they can place on the vendor.

Verifying that information security requirements are included in the contract is a good practice, but it does not provide sufficient assurance that the vendor is actually meeting those requirements. The contract may also have limitations or exclusions that reduce the customer's rights or remedies in case of a breach or incident.

Requesting customer references from the vendor is not a reliable way to assess the risk associated with using a SaaS vendor because the vendor may only provide positive or biased references that do not reflect the true experience or satisfaction of the customers. Customer references may also not have the same security needs or expectations as the customer who is conducting the assessment.

Requiring vendors to complete information security questionnaires is a useful way to gather information about the vendor's security policies and procedures, but it does not provide enough evidence or verification that the vendor is actually implementing and maintaining those policies and procedures. Information security questionnaires are also subject to the vendor's self-reporting and interpretation, which may not be accurate or consistent.Reference=

CISM Review Manual 15th Edition, page 144

SaaS Security Risk and Challenges - ISACA1

SaaS Security Checklist & Assessment Questionnaire | LeanIX2

Risk Assessment Guide for Microsoft Cloud3

asked 01/10/2024
Himanshu Sachdeva
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first