ExamGecko
Question list
Search
Search

Question 784 - CISM discussion

Report
Export

Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?

A.
Align the standards with the organizational policy.
Answers
A.
Align the standards with the organizational policy.
B.
Align the standards with industry best practices.
Answers
B.
Align the standards with industry best practices.
C.
Resolve the discrepancy before developing the standards.
Answers
C.
Resolve the discrepancy before developing the standards.
D.
Perform a cost-benefit analysis of aligning the standards to policy.
Answers
D.
Perform a cost-benefit analysis of aligning the standards to policy.
Suggested answer: C

Explanation:

The Information Security Manager's primary responsibility is to ensure that the organization's information assets are adequately protected. In this scenario, there is a conflict between the approved mobile access policy and industry best practices. Developing security standards based on a flawed policy could lead to significant security vulnerabilities.

Why the other options are not the best course of action:

A . Align the standards with the organizational policy: This would perpetuate the misalignment with best practices, potentially leaving the organization exposed to risks.

B . Align the standards with industry best practices: While this is ideal from a security perspective, it directly contradicts the approved policy, which could create operational and compliance issues.

D . Perform a cost-benefit analysis of aligning the standards to policy: A cost-benefit analysis might be useful at some point, but it does not address the fundamental issue of a policy that is not in line with best practices.

Key CISM Principles Reflected:

Alignment with Organizational Objectives: Security standards and policies should support and enable the organization's business objectives.

Risk Management: Identifying, assessing, and mitigating risks are essential elements of information security management.

Governance: Effective governance ensures that information security activities are aligned with the organization's strategies and objectives.

In summary: The Information Security Manager should proactively engage senior management to highlight the discrepancy between the approved policy and industry best practices. The goal is to revise the policy to ensure it adequately addresses security risks while supporting the organization's objectives. Once the policy is aligned with best practices, the security standards can be developed accordingly.

asked 01/10/2024
Ehsan Ali
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first