ExamGecko
Question list
Search
Search

Question 397 - CISM discussion

Report
Export

An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?

A.
Focus the review on the infrastructure with the highest risk
Answers
A.
Focus the review on the infrastructure with the highest risk
B.
Review controls listed in the vendor contract
Answers
B.
Review controls listed in the vendor contract
C.
Determine whether the vendor follows the selected security framework rules
Answers
C.
Determine whether the vendor follows the selected security framework rules
D.
Review the vendor's security policy
Answers
D.
Review the vendor's security policy
Suggested answer: B

Explanation:

Reviewing controls listed in the vendor contract is the most helpful approach for properly scoping the security assessment of an existing vendor because it helps to determine the security requirements and expectations that the vendor has agreed to meet. A vendor contract is a legal document that defines the terms and conditions of the business relationship between the organization and the vendor, including the scope, deliverables, responsibilities, and obligations of both parties. A vendor contract should also specify the security controls that the vendor must implement and maintain to protect the organization's data and systems, such as encryption, authentication, access control, backup, monitoring, auditing, etc. Reviewing controls listed in the vendor contract helps to ensure that the security assessment covers all the relevant aspects of the vendor's security posture, as well as to identify any gaps or discrepancies between the contract and the actual practices. Therefore, reviewing controls listed in the vendor contract is the correct answer.

https://medstack.co/blog/vendor-security-assessments-understanding-the-basics/

https://www.ncsc.gov.uk/files/NCSC-Vendor-Security-Assessment.pdf

https://securityscorecard.com/blog/how-to-conduct-vendor-security-assessment

asked 01/10/2024
Pilocz Pi
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first