Which of the following is MOST important to consider when developing an effective threat model during the introduction of a new SaaS service into a customer organization’s architecture? The threat model:
Answer(s): A
While performing the audit, the auditor found that an object storage bucket containing PII could be accessed by anyone on the Internet. Given this discovery, what should be the most appropriate action for the auditor to perform?
Answer(s): C
https://www.isaca.org/resources/isaca-journal/issues/2020/volume-1/is-audit-basics-thecomponents-of-the-it-audit-report
To qualify for CSA STAR attestation for a particular cloud system, the SOC 2 report must cover:
https://downloads.cloudsecurityalliance.org/star/attestation/GuidelinesforCPAsv2.pdf (8)
Which of the following is MOST important to consider when an organization is building a compliance program for the cloud?
When developing a cloud compliance program, what is the PRIMARY reason for a cloud customer to review which cloud services will be deployed?
https://www.isaca.org/credentialing/certificate-of-cloud-auditing-knowledge
Post your Comments and Discuss ISACA CCAK exam dumps with other Community members: