CISM Exam: Addressing Lower Than Acceptable Risk Levels

Addressing Lower Than Acceptable Risk Levels

Prev Question Next Question

Question

Before final acceptance of residual risk, what is the BEST way for an information security manager to address risk factors determined to be lower than acceptable risk levels?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

As an information security manager, when risk factors are determined to be lower than acceptable risk levels, the best way to address them is to evaluate whether an excessive level of control is being applied. This means that the security controls that have been implemented may be too strict and may be causing unnecessary constraints or inefficiencies in the organization. By reviewing the controls in place, the information security manager can identify where controls may be reduced or removed while still maintaining an acceptable level of risk.

Option B, asking senior management to increase the acceptable risk levels, is not a recommended solution as it may lead to accepting higher levels of risk than what is acceptable to the organization. This can result in potentially significant security incidents or breaches.

Option C, implementing more stringent countermeasures, may not be necessary as the risk factors have already been determined to be lower than acceptable levels. Implementing additional controls may not provide any significant benefits and may cause unnecessary costs or operational overhead.

Option D, asking senior management to lower the acceptable risk levels, may not be necessary either as the existing risk levels have already been deemed acceptable. Lowering the acceptable risk levels may lead to an unrealistic expectation of risk reduction or may unnecessarily constrain the organization's operations.

Therefore, the best way for an information security manager to address risk factors determined to be lower than acceptable risk levels is to evaluate whether an excessive level of control is being applied. This allows for the optimization of security controls while maintaining an acceptable level of risk for the organization.