CISM Exam Question: Mapping Job Description to Types of Data Access

Job Description and Types of Data Access

Prev Question Next Question

Question

An information security manager mapping a job description to types of data access is MOST likely to adhere to which of the following information security principles?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

Information security controls should be proportionate to the risks of modification, denial of use or disclosure of the information.

It is advisable to learn if the job description is apportioning more data than are necessary for that position to execute the business rules (types of data access)

Principles of ethics and integration have the least to do with mapping job description to types of data access.

The principle of accountability would be the second most adhered to principle since people with access to data may not always be accountable but may be required to perform an operation.

The most likely information security principle that an information security manager adheres to when mapping a job description to types of data access is Accountability (Option D).

Explanation: Accountability is a critical principle in information security that emphasizes the obligation of individuals and organizations to take responsibility for their actions, decisions, and their consequences. In an organization, accountability is typically implemented by assigning roles and responsibilities to individuals and ensuring that they are aware of their duties and expected outcomes.

Mapping job descriptions to types of data access is an essential process in managing access to sensitive data within an organization. The process involves identifying the types of data access required for each job position, defining the access levels and permissions for each type of data, and assigning the access rights to the relevant job position.

By adhering to the accountability principle, an information security manager can ensure that the data access mapping process is conducted responsibly, transparently, and consistently. This means that the manager is accountable for ensuring that the process is conducted in compliance with relevant laws, regulations, and policies, and that the assigned access rights are appropriate for the job requirements.

The other options, such as Ethics (Option A), Proportionality (Option B), and Integration (Option C), are also important principles in information security, but they are not directly related to mapping job descriptions to types of data access. Ethics emphasizes the moral principles and values that guide individual behavior and decision-making, while Proportionality emphasizes the need to balance security measures with the potential risks and benefits. Integration emphasizes the importance of integrating security measures into the organization's overall strategy and culture.