Implementing Effective Document Collaboration Solution for Secure Information Sharing | CISM Exam Answer

The Most Important Control to Mitigate Risks with a Document Collaboration Solution | CISM Exam

Prev Question Next Question

Question

An organization plans to implement a document collaboration solution to allow employees to share company information.

Which of the following is the MOST important control to mitigate the risk associated with the new solution?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

When implementing a document collaboration solution for an organization, it is important to ensure that appropriate controls are put in place to mitigate risks associated with the solution.

Out of the given options, the MOST important control to mitigate the risk associated with the new solution is to assign write access to data owners (Option A).

Here's why:

Assigning write access to data owners ensures that only authorized personnel are able to modify, edit or delete company information on the collaboration solution. Data owners are typically individuals who are responsible for the accuracy, integrity, and confidentiality of specific sets of data. By assigning write access to data owners, the organization can ensure that access to sensitive company information is restricted and only authorized personnel can make changes to it.

Option B, allowing a minimum number of user access to the solution, may not be the most effective control as it does not necessarily address the issue of unauthorized access to sensitive company information. An attacker or malicious insider with access to the solution could still cause damage or steal sensitive information even if the number of users is restricted.

Option C, having data owners perform regular user access reviews, is a good control to ensure that access is reviewed on a regular basis. However, it may not be the most important control to mitigate the risk associated with the new solution. It is more effective to prevent unauthorized access in the first place by assigning write access to data owners.

Option D, permitting only non-sensitive information on the solution, is not the most effective control as it limits the functionality of the solution and does not address the issue of unauthorized access to sensitive company information that may still be present on the solution.

In conclusion, assigning write access to data owners is the MOST important control to mitigate the risk associated with the new document collaboration solution.