A Chief Information Security Officer (CISO) of a firm which decided to migrate to cloud has been tasked with ensuring an optimal level of security. Which of the following would be the FIRST consideration?
A.
Analyze the firm's applications and data repositories to determine the relevant control requirements.
B.
Request a security risk assessment of the cloud vendor be completed by an independent third-party.
C.
Define the cloud migration roadmap and set out which applications and data repositories should be moved into the cloud.
D.
Ensure that the contract between the cloud vendor and the firm clearly defines responsibilities for operating security controls.
I said B because I figure you want to review a risk assessment from a potential cloud provider prior to getting into the nuts and bolts of the project.
Can't be B. Performing a cloud vendor risk assessment is important but comes after understanding your internal security requirements. Can't be C. Defining a migration roadmap depends on knowing the control requirements first. Can't be D. Drafting the contract and responsibility matrix comes after you've defined your security needs.
For anyone who has been involved in SaaS or cloud vendor assessment. During the cloud provider selection process A, B, C are priorities.
Given that different cloud providers offer differing security systems and options. Considering level Optimal security is largely dependant on working with a vendor. As a best practice, you cannot work with the cloud vendor until after A, B, C are done.
In short if the CISO focus is on settling on optimal security, the vendor is chosen The correct answer is D Ensure that the contract between the cloud vendor and the firm clearly defines responsibilities for operating security controls.. The CISO is focused on contract terms and selection from an array of security controls available with the chosen provider
This seems like a tricky question and I think too many people are jumping to answer A. I doubt the answer is a because there is no need for it. What security controls are needed is an easy answer. Its the same controls as for ANY 3rd party vendor.... you apply the same level of security as you would have internally.
Answer is C:
The CISO Was tasked (made responsible). the CISO becomes the project manager there this question is more about the project management field therefore the C. "Define" becomes more relevant..
(C) is a strategic decision that should be made after assessing the feasibility, benefits, and costs of migrating different assets and processes to the cloud, as well as the potential impact on the firm's operations and performance
A will help the CISO to identify the security risks, gaps, and needs of the firm's assets and processes, and to select the appropriate cloud service model and deployment model that can meet those requirements.
Option A (Analyze) is correct because before migrating to the cloud, it is essential to understand the applications and data repositories that need to be moved to the cloud and identify the relevant security controls required to protect them. This analysis helps in determining which cloud service provider to choose and what security controls should be implemented to ensure the optimal level of security. Once this analysis is done, the CISO can then move on to the other options mentioned to ensure a secure cloud migration.
B. The first step should be to verify that the vendor is following security practices:
"Very often, you will have to rely on an external audit (ISO, SOC, etc.) conducted on the provider. These audits can provide an in-depth, objective, technical review of the third party’s security. What they demonstrate is that the vendor is trying to align their security program with a commonly accepted standard. These reports might be your best available resource for understanding a cloud provider’s risk—make sure you read them right."
https://www.coalfire.com/the-coalfire-blog/third-party-risk-management-and-the-cloud
B. Request a security risk assessment of the cloud vendor be completed by an independent third-party.
It is important to understand the security posture of the cloud vendor before moving any sensitive information or applications to the cloud. A security risk assessment can help identify any potential vulnerabilities or compliance issues with the vendor's controls and infrastructure, and allow the CISO to make an informed decision about whether to proceed with the migration and what measures need to be put in place to mitigate those risks.
Defining the migration road map isn't CISO responsibility, and analyzing the firm's applications and data to determine the relevant control requirements comes before D. So i will go with A
According to the Certified Information Systems Security Professional (CISSP) certification, the first consideration for a Chief Information Security Officer (CISO) tasked with ensuring an optimal level of security for a firm's migration to the cloud would be to "Analyze the firm's applications and data repositories to determine the relevant control requirements" (Option A).
This includes identifying and classifying sensitive data and applications, assessing the current level of security for those assets, and determining the specific security controls that will be required to protect them in the cloud environment. This step is critical because it helps the CISO understand the scope of the migration and ensure that the appropriate security controls are implemented to protect the firm's sensitive data and systems.
The other options are important steps as well but it is important to understand that the first step is identifying and assessing the security requirement for the data and system that are to be migrated into the cloud.
This section is not available anymore. Please use the main Exam Page.CISSP Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
sphenixfire
Highly Voted 2 years, 8 months agoATT5832
Most Recent 1 month agoBigITGuy
4 months, 3 weeks agostack120566
8 months, 2 weeks agoTheManiac
1 year, 3 months agoeboehm
1 year, 4 months agohomeysl
1 year, 5 months agogjimenezf
1 year, 7 months agomaawar83
1 year, 7 months agothanhlb
1 year, 9 months agothanhlb
1 year, 9 months ago74gjd_37
1 year, 11 months agoHughJassole
2 years, 1 month agoDarealis
2 years, 6 months agojackdryan
2 years, 3 months agoshash33
2 years, 7 months agoDJOEK
2 years, 7 months agorajkamal0
2 years, 7 months agooudmaster
2 years, 8 months ago