Scenario:
The risk assessment process was led by Henry, Bontton's risk manager. The first step that Henry took was identifying the company's assets. Afterward, Henry created various potential incident scenarios. One of the main concerns regarding the use of the application was the possibility of being targeted by cyber attackers, as a great number of organizations were experiencing cyberattacks during that time. After analyzing the identified risks, Henry evaluated them and concluded that new controls must be implemented if the company wants to use the application. Among others, he stated that training should be provided to personnel regarding the use of the application and that awareness sessions should be conducted regarding the importance of protecting customers' personal data. Lastly, Henry communicated the risk assessment results to the top management. They decided that the application will be used only after treating the identified risks. According to scenario 1, what type of controls did Henry suggest?
- Technical
- Managerial
- Administrative
Answer(s): C
Explanation:
In the context of Scenario 1, the controls suggested by Henry, such as training personnel on the use of the application and conducting awareness sessions on protecting customers' personal data, fall under the category of "Administrative" controls. Administrative controls are policies, procedures, guidelines, and training programs designed to manage the human factors of information security. These controls are aimed at reducing the risks associated with human behavior, such as lack of awareness or improper handling of sensitive data, and are distinct from "Technical" controls (like firewalls or encryption) and "Managerial" controls (which include risk management strategies and governance frameworks).
Reference:
ISO/IEC 27005:2018, Annex A, "Controls and Safeguards," which mentions the importance of administrative controls, such as awareness training and the development of policies, to mitigate identified risks.
ISO/IEC 27001:2013, Annex A, Control A.7.2.2, "Information security awareness, education, and training," which directly relates to administrative controls for personnel security.
Reveal Solution Next Question