A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
A.
Request funding needed to resolve the top vulnerabilities.
B.
Ensure a risk assessment is performed to evaluate the findings.
C.
Report findings to senior management.
D.
Ensure vulnerabilities found are resolved within acceptable timeframes.
For those chatgpt lover, below is also from chatgpt:
Penetration result should be report to senior management directly without information security manager assessment
Reporting penetration test results directly to senior management without the assessment of the information security manager could be risky. The information security manager typically has a deep understanding of the organization's security posture, its vulnerabilities, and its risk tolerance. Their assessment is valuable in interpreting the penetration test results accurately and providing context to senior management. Excluding the information security manager from this process could lead to misunderstandings or misinterpretations of the results.
Reporting the findings of a test conducted by a 3rd party, accredited or not, to the senior management, without ascertaining them is hasty. Afterall, Pentesters have a tunnel vision; they are highly technical and do not take the business perspective into consideration. Reviewing the findings with business owners, or as in our case, evaluating the findings through risk assessment is important.
The information security manager to prioritize option B: Ensure a risk assessment is performed to evaluate the findings as their first course of action.
A risk assessment is crucial to understand the impact and likelihood of the vulnerabilities identified during the penetration test. It helps in determining the potential risks and prioritizing them based on their severity and potential impact on the organization's security posture.
Once the risk assessment is performed, the information security manager can then proceed with other actions such as reporting findings to senior management, requesting funding, and ensuring vulnerabilities are resolved within acceptable timeframes. However, without a proper understanding of the risks associated with the vulnerabilities, these actions may not be prioritized effectively.
C. Report findings to senior management.
The first course of action for the information security manager after a penetration test conducted by an accredited third party should be to report the findings to senior management. This step is crucial because it provides transparency and ensures that the organization's leadership is aware of the security vulnerabilities and risks identified during the penetration test.
Once senior management is informed, they can make informed decisions about how to proceed, which may include:
Allocating funding (option A) to address the identified vulnerabilities.
Initiating a risk assessment (option B) to evaluate the findings in more detail.
Establishing priorities for resolving vulnerabilities (option D) within acceptable timeframes.
However, it's essential to start by reporting the findings to senior management so that they can be involved in the decision-making process and provide the necessary support and resources for addressing security issues.
C. Report findings to senior management.
Reporting the findings to senior management is essential because it ensures that the highest levels of the organization are aware of the security vulnerabilities and risks identified during the penetration test. This allows senior management to make informed decisions about allocating resources, prioritizing actions, and setting the overall direction for addressing the security issues identified. Once senior management is informed, subsequent actions such as requesting funding, conducting a risk assessment, and resolving vulnerabilities can be coordinated and prioritized based on their strategic importance to the organization.
In my company, pentest result must be reviewed before report to senior management, to validate the business relevance. Recommendation must be customized before submit.
If C is correct, a generated report can conclude, why we persue CISM, our existence has a reason.
If a pen test is done by a dependable accredited third party - why would you need to repeat a risk assessment - isint their study / analysis considered concrete?
Because you would want to validate that on how those findings impact your organization. Based on the risk assessment you can then determine the appropriate security measures to prevent further findings.
C. Report findings to senior management.
Reporting the findings to senior management is the first step that should be taken after a penetration test. It is crucial to inform senior management about the results, including the identified vulnerabilities and potential risks to the organization's information security. This allows management to have a clear understanding of the current security posture and make informed decisions regarding risk mitigation and resource allocation.
The correct answer is (B) Ensure a risk assessment is performed to evaluate the findings. Cause without validating the results any actions that comes next would lead to some erroneous actions/results.
Rationale:
(A) it's not A cause funding should only be asked for once we know the results from the pentest are valid and need to be acted against based on the org risk appetite of the findings.
(C) Reporting to management without validating the results is not a smart idea as it can call one's judgment into question.
(D) The question is whether these need to be addressed in the first place and in what order. without doing a risk assessment step D is premature.
The information security manager's FIRST course of action after a penetration test should be to report the findings to senior management. This is because senior management needs to be aware of the risks that have been identified and the potential impact of those risks on the organization. From there, the information security manager can work with management to determine the appropriate course of action, which may include requesting funding, performing a risk assessment, or resolving vulnerabilities within acceptable timeframes.
Risk Assessment would evaluates potential risks and threats that could disrupt operations and assess the likelihood and impact. Validating the 3rd parties finding.
upvoted 1 times
...
...
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Thavee
8 months, 2 weeks agoxcjxcj
10 months, 1 week agoCISSPST
1 year, 3 months agowickhaarry
1 year, 3 months agokoala_lay
1 year, 3 months agoCert_IT
1 year, 3 months agooluchecpoint
1 year, 3 months agoGoseu
1 year, 5 months agoxcjxcj
10 months, 1 week agoGoseu
1 year, 5 months agorichck102
1 year, 6 months agoddharia94
1 year, 6 months ago45
1 year, 6 months agowello
1 year, 6 months agomad68
1 year, 7 months agodark_3k03r
1 year, 8 months agoSouvik124
1 year, 10 months agoD2D2
2 years agoEZPASS
2 years, 1 month agoZiggybooboo
2 years, 2 months ago6and0
1 year, 3 months ago