Which of the following is MOST important to consider when developing an effective threat model during the introduction of a new SaaS service into a customer organization’s architecture? The threat model:
Answer(s): A
While performing the audit, the auditor found that an object storage bucket containing PII could be accessed by anyone on the Internet. Given this discovery, what should be the most appropriate action for the auditor to perform?
Answer(s): C
https://www.isaca.org/resources/isaca-journal/issues/2020/volume-1/is-audit-basics-thecomponents-of-the-it-audit-report
To qualify for CSA STAR attestation for a particular cloud system, the SOC 2 report must cover:
https://downloads.cloudsecurityalliance.org/star/attestation/GuidelinesforCPAsv2.pdf (8)
Which of the following is MOST important to consider when an organization is building a compliance program for the cloud?
Post your Comments and Discuss ISACA CCAK exam with other Community members:
ccak Commented on June 08, 2023 ccak is hard Anonymous
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the CCAK content, but please register or login to continue.