Addressing Legacy System Security Threats: Best Course of Action | CISA Exam Preparation

Effective Measures to Mitigate Legacy System Security Risks

Prev Question Next Question

Question

A core business unit relies on an effective legacy system that does not meet the current security standards and threatens the enterprise network.

Which of the following is the BEST course of action to address the situation?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

The BEST course of action to address the situation where a core business unit relies on an effective legacy system that does not meet the current security standards and threatens the enterprise network would be to implement option A, which is to require that new systems that can meet the standards be implemented.

Explanation:

Option A is the best course of action as it addresses the root cause of the problem, which is the outdated legacy system. The legacy system is a security risk, and its continued use could lead to a breach of the enterprise network. Implementing new systems that meet the current security standards would ensure that the enterprise network remains secure.

Option B, which involves documenting the deficiencies in the risk register, is not enough to address the security risk posed by the legacy system. Although documenting the deficiencies is important, it does not provide a solution to the security risk.

Option C, which involves developing processes to compensate for the deficiencies, is also not a good course of action as it does not address the root cause of the problem. The deficiencies in the legacy system cannot be compensated for by developing processes, and this could lead to increased security risks.

Option D, which involves disconnecting the legacy system from the rest of the network, is not a good course of action either. Disconnecting the legacy system would mean that the core business unit would not be able to use it, and this could negatively impact the operations of the enterprise. Additionally, if the legacy system contains critical business data, disconnecting it from the network could result in the loss of important information.

In conclusion, the BEST course of action to address the situation where a core business unit relies on an effective legacy system that does not meet the current security standards and threatens the enterprise network is to require that new systems that can meet the standards be implemented.