A recent audit uncovered a key finding regarding the use of a specific encryption standardin a web application that is used to communicate with business customers.
Due to the technical limitations of its customers, the company is unable to upgrade the encryption standard.
Which of the following types of controls should be used to reduce the risk created by this scenario?
A.
Physical B.
Detective C.
Preventive D.
Compensating.
D.
A recent audit uncovered a key finding regarding the use of a specific encryption standardin a web application that is used to communicate with business customers.
Due to the technical limitations of its customers, the company is unable to upgrade the encryption standard.
Which of the following types of controls should be used to reduce the risk created by this scenario?
A.
Physical
B.
Detective
C.
Preventive
D.
Compensating.
D.
The scenario mentioned in the question is that a recent audit found that a specific encryption standard used in a web application that communicates with business customers is not secure and needs to be upgraded. However, due to the technical limitations of the customers, the company is unable to upgrade the encryption standard.
In such a situation, the organization must implement compensating controls to reduce the risk created by the scenario. Compensating controls are alternative measures that are put in place when a primary control is not feasible or cannot be implemented. These controls are used to compensate for the deficiency in the primary control and mitigate the risk associated with it.
In this case, the primary control is the encryption standard used in the web application, which is not secure. The organization cannot upgrade this encryption standard due to the technical limitations of its customers. Therefore, the organization needs to implement compensating controls to reduce the risk created by the use of an insecure encryption standard.
Examples of compensating controls that could be used in this scenario include:
In summary, compensating controls should be used in situations where a primary control is not feasible or cannot be implemented. In this scenario, the organization cannot upgrade the encryption standard used in the web application due to the technical limitations of its customers. Therefore, compensating controls should be implemented to reduce the risk associated with the use of an insecure encryption standard.