Lowest Priority Requirement in Information Security | CISM Exam - ISACA

Lowest Priority Requirement in Information Security

Prev Question Next Question

Question

Which of the following requirements would have the lowest level of priority in information security?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

Information security priorities may, at times, override technical specifications, which then must be rewritten to conform to minimum security standards.

Regulatory and privacy requirements are government-mandated and, therefore, not subject to override.

The needs of the business should always take precedence in deciding information security priorities.

It's important to note that information security requirements should be viewed as interconnected, and not as competing priorities. However, given the question, here's a breakdown of the different types of requirements and their potential priorities.

A. Technical Requirements: Technical requirements refer to the security controls and technologies that are used to secure an organization's systems and data. These requirements may include measures such as firewalls, encryption, access controls, intrusion detection, and prevention systems. While technical requirements are important for ensuring the security of an organization's assets, they may not necessarily be the highest priority, as they can be supported by other types of requirements, such as regulatory or business requirements.

B. Regulatory Requirements: Regulatory requirements are laws, regulations, and standards that organizations must comply with to ensure the security and privacy of their data. Regulatory requirements may include data protection laws, industry standards, and compliance frameworks. Compliance with regulatory requirements is important for organizations, as non-compliance can result in significant fines and penalties. Depending on the nature of the organization's business, regulatory requirements may be a high priority.

C. Privacy Requirements: Privacy requirements refer to the policies and procedures that organizations put in place to protect the personal information of their employees, customers, and other stakeholders. These requirements may include measures such as data access controls, data retention policies, and data destruction policies. Protecting privacy is important for maintaining trust with stakeholders, and can also help organizations avoid legal and reputational risks. Depending on the nature of the organization's business and the sensitivity of the data they handle, privacy requirements may be a high priority.

D. Business Requirements: Business requirements refer to the objectives and goals of the organization, and the measures that are put in place to achieve them. These requirements may include measures such as risk management, financial controls, and operational procedures. While information security is critical to the success of any business, business requirements may not necessarily be the highest priority when it comes to information security. However, it is important to ensure that information security measures are aligned with the organization's business objectives.

Overall, it's important to note that information security requirements are interdependent, and organizations should strive to balance the different priorities based on their specific needs and risks. While technical, regulatory, privacy, and business requirements may have different priorities in different organizations, all of these requirements should be considered important in the context of information security.