C. Exceptions reflect the organizational risk appetite.
While all of the options are important in the context of information security, ensuring that exceptions align with the organization's risk appetite is crucial. This means that exceptions should be evaluated and granted or denied in a way that takes into account the organization's tolerance for risk. If an exception introduces too much risk or deviates significantly from the established risk tolerance, it could jeopardize the overall security of the organization. Therefore, aligning exceptions with the organization's risk appetite is a fundamental consideration in the exception management process.
C. Exceptions reflect the organizational risk appetite.
While all of the options are important in the context of information security, ensuring that exceptions align with the organization's risk appetite is crucial. This means that exceptions should be evaluated and granted or denied in a way that takes into account the organization's tolerance for risk. If an exception introduces too much risk or deviates significantly from the established risk tolerance, it could jeopardize the overall security of the organization. Therefore, aligning exceptions with the organization's risk appetite is a fundamental consideration in the exception management process.
Such tradeoffs should be considered in the policy development
process, when possible, to minimize the need for
subsequent exceptions. As part of the program
development, a formal waiver process should be
implemented to manage the life cycle of these
exceptions to ensure they are periodically reviewed and,
when possible, closed. Any such policy exceptions must
be assessed for risk and impact prior to implementation
and the identified risk accepted by appropriate levels of
management.
The most important thing to ensure when considering exceptions to an information security policy is that exceptions reflect the organizational risk appetite. This means that the organization's risk management strategy and risk appetite should be taken into account when determining whether to grant an exception to the security policy. An organization's risk appetite is its tolerance for risk and the level of risk that it is willing to accept in order to achieve its business objectives. Exceptions to the security policy should not exceed the organization's risk appetite, and should be carefully evaluated to ensure that they do not create unacceptable risks.
upvoted 4 times
...
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
roman_cat
9 months agooluchecpoint
11 months, 2 weeks agoAlexJacobson
11 months, 4 weeks agoLearner76
1 year, 1 month agowickhaarry
1 year, 3 months agooluchecpoint
1 year, 4 months agoAlexJacobson
11 months, 4 weeks agoAgamennore
1 year, 4 months agowello
1 year, 7 months agorichck102
1 year, 7 months agoBroesweelies
1 year, 12 months ago