Maintaining Security Posture in Cloud Hosting Services | Answer to CISM Exam Question

Maintaining Security Posture in Cloud Hosting Services

Prev Question Next Question

Question

An organization is considering moving one of its critical business applications to a cloud hosting service.

The cloud provider may not provide the same level of BEST - security for this application as the organization.

Which of the following will provide the information to help maintain the security posture?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

In this scenario, the organization is considering moving a critical business application to a cloud hosting service that may not provide the same level of BEST (Business Enhancement and Security Technology) security as the organization. The organization needs to maintain its security posture while utilizing the cloud hosting service.

To achieve this objective, the organization must gather information that will help it maintain its security posture. The possible solutions for this are as follows:

A. Risk Assessment: Risk assessment is the process of identifying, analyzing, and evaluating the risks associated with a particular activity or system. In this scenario, the organization can conduct a risk assessment to identify the potential risks associated with moving the business application to the cloud hosting service. A risk assessment can help the organization determine the security requirements for the application and assess the security capabilities of the cloud provider. Based on the results of the risk assessment, the organization can implement appropriate security controls to mitigate the risks.

B. Cloud Security Strategy: A cloud security strategy is a plan that outlines the security requirements and controls necessary for protecting data and applications in the cloud. The organization can develop a cloud security strategy to ensure that the critical business application is adequately protected while hosted in the cloud. The strategy should outline the security controls that the cloud provider should implement to protect the application and the data associated with it. The organization should ensure that the cloud provider meets the security requirements outlined in the cloud security strategy.

C. Vulnerability Assessment: A vulnerability assessment is the process of identifying and evaluating the vulnerabilities present in a system or application. The organization can conduct a vulnerability assessment to identify the vulnerabilities in the critical business application and the associated data. The organization can then work with the cloud provider to address the identified vulnerabilities to ensure that the application is adequately protected.

D. Risk Governance Framework: A risk governance framework is a set of policies, procedures, and controls that guide the management of risks within an organization. The framework should outline the roles and responsibilities of the individuals involved in managing risks, the risk management processes, and the reporting requirements. The organization can use a risk governance framework to manage the risks associated with moving the critical business application to the cloud hosting service.

In conclusion, in this scenario, the most appropriate solution to maintain the security posture of the critical business application while utilizing the cloud hosting service is to conduct a risk assessment. A risk assessment will help the organization identify the potential risks associated with moving the application to the cloud and the necessary security controls to mitigate those risks.