ExamGecko
Question list
Search
Search

Question 423 - CISM discussion

Report
Export

Which of the following is the PRIMARY role of the information security manager in application development?

A.
To ensure security is integrated into the system development life cycle (SDLC)
Answers
A.
To ensure security is integrated into the system development life cycle (SDLC)
B.
To ensure compliance with industry best practice
Answers
B.
To ensure compliance with industry best practice
C.
To ensure enterprise security controls are implemented
Answers
C.
To ensure enterprise security controls are implemented
D.
To ensure control procedures address business risk
Answers
D.
To ensure control procedures address business risk
Suggested answer: A

Explanation:

According to the CISM Review Manual, one of the primary roles of the information security manager in application development is to ensure that security is integrated into the SDLC. This means that security requirements, design, testing, deployment, and maintenance are all considered and addressed throughout the application development process.By doing so, the information security manager can help to prevent or mitigate security risks, ensure compliance with standards and regulations, and improve the quality and reliability of the application1

The other options are not as accurate as ensuring security is integrated into the SDLC. Ensuring compliance with industry best practices is a secondary role of the information security manager in application development, as it involves following established guidelines and frameworks for secure application development. However, compliance alone does not guarantee that security is actually implemented in the application. Ensuring enterprise security controls are implemented is a tertiary role of the information security manager in application development, as it involves applying existing policies and procedures for managing and monitoring security activities across the organization. However, enterprise controls alone do not ensure that security is tailored to the specific needs and context of each application. Ensuring control procedures address business risk is a quaternary role of the information security manager in application development, as it involves identifying and assessing potential threats and vulnerabilities that could affect the business objectives and operations of each application.However, business risk alone does not ensure that security measures are aligned with the value proposition and benefits of each application1

Reference=1: CISM Review Manual, 16th Edition, ISACA, 2020, pp. 30-31...

asked 01/10/2024
luis lozano
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first