A core business unit relies on an effective legacy system that does not meet the current security standards and threatens the enterprise network.
Which of the following is the BEST course of action to address the situation?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
The BEST course of action to address the situation in which a core business unit relies on an effective legacy system that does not meet the current security standards and threatens the enterprise network is option C, which requires that new systems that can meet the standards be implemented.
Option A, which suggests documenting the deficiencies in the risk register, can be a useful step in managing risks, but it does not address the issue of the legacy system and the threat it poses to the enterprise network.
Option B, which recommends disconnecting the legacy system from the rest of the network, can mitigate the risk posed by the legacy system but can also potentially impact the ability of the core business unit to operate effectively, as it relies on the legacy system. Furthermore, disconnecting the system may not address all security concerns associated with it.
Option D, which suggests developing processes to compensate for the deficiencies, is not the best course of action as it does not address the root cause of the problem, which is the legacy system's inability to meet current security standards.
Therefore, the best approach to address the situation is to require that new systems that can meet the security standards be implemented. This approach ensures that the core business unit can continue to operate effectively while also addressing the security concerns posed by the legacy system. Additionally, new systems that can meet security standards will ensure that the organization's overall security posture is improved.