ExamGecko
Question list
Search
Search

Question 618 - CISM discussion

Report
Export

Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?

A.
Include security requirements in the contract.
Answers
A.
Include security requirements in the contract.
B.
Update the risk register.
Answers
B.
Update the risk register.
C.
Consult with the business owner.
Answers
C.
Consult with the business owner.
D.
Restrict application network access temporarily.
Answers
D.
Restrict application network access temporarily.
Suggested answer: C

Explanation:

Consulting with the business owner is the FIRST course of action that the information security manager should take to address the risk associated with a new third-party cloud application that will not meet organizational security requirements, because it helps to understand the business needs and expectations for using the application, and to communicate the security risks and implications. The information security manager and the business owner should work together to evaluate the trade-offs between the benefits and the risks of the application, and to determine the best course of action, such as modifying the requirements, finding an alternative solution, or accepting the risk.

Reference=

CISM Review Manual, 16th Edition, ISACA, 2020, p. 41: ''The information security manager should consult with the business owners to understand their needs and expectations for using third-party services, and to communicate the security risks and implications.''

CISM Review Manual, 16th Edition, ISACA, 2020, p. 42: ''The information security manager and the business owners should collaborate to evaluate the trade-offs between the benefits and the risks of using third-party services, and to determine the best course of action, such as modifying the requirements, finding an alternative solution, or accepting the risk.''

Best Practices to Manage Risks in the Cloud - ISACA: ''The information security manager should work with the business owner to define the security requirements for the cloud service, such as data protection, access control, incident response, and compliance.''

asked 01/10/2024
Tom Starren
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first