Security Services and Controls: Safeguarding Information Management | CISSP-ISSEP Exam

Threats to Information Management and Security Services: Countermeasures and Controls | CISSP-ISSEP Exam

Question

Which of the following documents contains the threats to the information management, and the security services and controls required to counter those threats.

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

The document that contains the threats to the information management, and the security services and controls required to counter those threats is the Information Protection Policy (IPP).

The Information Protection Policy is a document that outlines an organization's overall approach to information security. It defines the security controls necessary to protect the confidentiality, integrity, and availability of the organization's information assets. The IPP provides a comprehensive view of the information security program of an organization, which includes information management, threats, vulnerabilities, and the necessary security controls to counter them.

The IPP includes policies and procedures related to access control, network security, physical security, data protection, incident response, and security monitoring. The document details the specific security requirements necessary for the organization to protect its sensitive data and other information assets from unauthorized access, use, modification, disclosure, or destruction.

The System Security Context is a document that provides an overview of the system's security architecture and environment, and how it supports the organization's mission and business functions. The CONOPS (Concept of Operations) is a document that describes the overall concept and objectives of the system or project, including its capabilities, operating environment, and performance requirements. The IMM (Information Management Manual) is a document that outlines the policies, procedures, and guidelines for managing an organization's information resources. These documents may contain information about threats and security controls, but they do not provide the comprehensive view of the organization's information security program that the IPP provides.

Therefore, the correct answer is B. Information Protection Policy (IPP).