Determining Resource Allocation for Mitigating Exposures | CISM Exam Question | ISACA

Information Security Management: Resource Allocation for Mitigating Exposures

Prev Question Next Question

Question

A successful information security management program should use which of the following to determine the amount of resources devoted to mitigating exposures?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

Risk analysis results are the most useful and complete source of information for determining the amount of resources to devote to mitigating exposures.

Audit report findings may not address all risks and do not address annual loss frequency.

Penetration test results provide only a limited view of exposures, while the IT budget is not tied to the exposures faced by the organization.

The amount of resources that an organization devotes to mitigating security exposures should be determined based on the results of a risk analysis.

Risk analysis is the process of identifying, assessing, and prioritizing risks to the organization's assets and determining the probability and impact of those risks. It helps an organization to identify the most critical assets, vulnerabilities, and potential threats, and then determine the appropriate measures to mitigate those risks.

By analyzing risks, an organization can determine the potential impact of a security breach and prioritize the allocation of resources to address the most significant threats. The resources may include personnel, technology, and financial resources.

Audit report findings and penetration test results can provide valuable information about an organization's security posture and identify vulnerabilities that need to be addressed. However, these results alone may not be sufficient to determine the appropriate allocation of resources. They should be considered in conjunction with a risk analysis to ensure that the organization is focusing on the most significant risks.

The amount of IT budget available may be a consideration when allocating resources, but it should not be the sole determinant. A risk analysis should guide the decision-making process, with the IT budget serving as a constraint on the final decision.

In summary, a successful information security management program should use risk analysis results to determine the amount of resources devoted to mitigating exposures, taking into consideration other factors such as audit report findings and penetration test results, as well as the IT budget available.