Proposing a Security Solution | CISM Exam | ISACA

What Security Managers Utilize for Proposing Security Solutions

Prev Question Next Question

Question

What would a security manager PRIMARILY utilize when proposing the implementation of a security solution?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

The information security manager needs to prioritize the controls based on risk management and the requirements of the organization.

The information security manager must look at the costs of the various controls and compare them against the benefit the organization will receive from the security solution.

The information security manager needs to have knowledge of the development of business cases to illustrate the costs and benefits of the various controls.

All other choices are supplemental.

When proposing the implementation of a security solution, a security manager would primarily utilize a business case.

A business case is a comprehensive document that outlines the reasons, benefits, costs, and risks associated with a proposed project or initiative. In the context of information security, a business case would explain why a particular security solution is needed, how it will benefit the organization, what risks it will mitigate, and what the costs and potential return on investment (ROI) are.

A business case would typically include a description of the current security environment, an assessment of the risks and threats faced by the organization, a detailed explanation of the proposed security solution, a cost-benefit analysis, and a timeline for implementation. It would also take into account the organization's overall goals and objectives and how the proposed security solution would support those goals.

A risk assessment report and a technical evaluation report would be important inputs into the development of a business case, but they would not be sufficient on their own. A risk assessment report would provide information about the potential risks and threats faced by the organization, while a technical evaluation report would provide information about the technical specifications and capabilities of various security solutions. However, a business case would combine these inputs with broader strategic and financial considerations to make a compelling case for the implementation of a specific security solution.

Budgetary requirements would be an important consideration in the development of a business case, as the cost of the proposed security solution would need to be weighed against the potential benefits and the organization's overall budget constraints. However, budgetary requirements would not be the primary focus of the business case, as the emphasis would be on demonstrating the value of the proposed security solution in terms of risk mitigation, improved operational efficiency, and enhanced security posture.