ExamGecko
Question list
Search
Search

Question 313 - CISM discussion

Report
Export

An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:

A.
service level agreements (SLAs)
Answers
A.
service level agreements (SLAs)
B.
security requirements for the process being outsourced.
Answers
B.
security requirements for the process being outsourced.
C.
risk-reporting methodologies.
Answers
C.
risk-reporting methodologies.
D.
security metrics
Answers
D.
security metrics
Suggested answer: B

Explanation:

An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus primarily on defining security requirements for the process being outsourced. Security requirements are the specifications of what needs to be done to protect the information assets from unauthorized access, use, disclosure, modification, or destruction. Security requirements should be aligned with the organization's risk appetite and business objectives, and should cover both technical and organizational aspects of the service delivery. Security requirements should also be clear, concise, measurable, achievable, realistic, and testable.Reference= CISM Review Manual (Digital Version), Chapter 3: Information Security Risk Management, Section 3.1: Risk Identification, p.115-1161. CISM Review Manual (Print Version), Chapter 3: Information Security Risk Management, Section 3.1: Risk Identification, p.115-1162. CISM ITEM DEVELOPMENT GUIDE, Domain 3: Information Security Program Development and Management, Task Statement 3.1, p.193.

Security requirements for the process being outsourced are the specifications and standards that the third party must comply with to ensure the confidentiality, integrity and availability of the critical business information. They define the roles and responsi-bilities of both parties, the security controls and measures to be implemented, the se-curity objectives and expectations, the security risks and mitigation strategies, and the security monitoring and reporting mechanisms. Security requirements are essential to protect the information assets of the organization and to establish a clear and en-forceable contractual relationship with the third party.

* 1 Outsourcing Strategies for Information Security: Correlated Losses and Security Exter-nalities - SpringerLink

* 2 What requirements must outsourcing services comply with for the European market? - CBI

* 3 Outsourcing cybersecurity: What services to outsource, what to keep in house - Infosec Institute

* 4 BCFSA outsourcing and information security guidelines - BLG

asked 01/10/2024
Tom Bodett
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first