Following an unauthorized disclosure of data, an organization needs to implement data loss prevention (DLP) measures.
The IS auditor's BEST recommendation should be to:
Click on the arrows to vote for the correct answer
A. B. C. D.D.
In this scenario, the organization has experienced an unauthorized disclosure of data, and the IS auditor's task is to recommend the best DLP measures to prevent recurrence of such incidents. Data loss prevention (DLP) is a set of tools and processes used to prevent sensitive or confidential data from leaving an organization's network. The IS auditor should recommend a comprehensive approach that addresses the underlying causes of the data loss incident.
Option A suggests installing DLP software on corporate servers to prevent recurrence. While this is a valid measure, it is not comprehensive enough to address the root causes of the data loss incident. Simply installing DLP software does not address other possible attack vectors that may have been exploited by the attacker, such as social engineering or weak access controls.
Option B suggests monitoring and blocking outgoing emails based on common DLP criteria. This measure may be effective in preventing unauthorized disclosure of data through email, but it does not address other potential data loss vectors. Furthermore, it may not be a viable option if the organization relies heavily on email communication.
Option C suggests restricting removable media access on all computer systems. This measure may be effective in preventing unauthorized disclosure of data through removable media such as USB drives or external hard drives. However, it does not address other potential attack vectors, and it may not be practical if employees need to use removable media for legitimate business purposes.
Option D suggests establishing a risk and control framework. This measure is the best recommendation as it addresses the underlying causes of the data loss incident. A risk and control framework is a structured approach to identifying, assessing, and managing risks. By establishing a risk and control framework, the organization can identify the root causes of the data loss incident and implement measures to address those causes. This approach is comprehensive and addresses potential attack vectors beyond email and removable media.
In conclusion, the IS auditor's BEST recommendation should be to establish a risk and control framework (Option D) as it provides a comprehensive approach to address the root causes of the data loss incident.