Which of the following would be the MOST effective mitigating control when a legacy application does not have the capability to appropriately enforce separation of duties?
C. Monitor transaction logs.
Monitoring transaction logs is a practical and effective way to oversee and review the activities within the legacy application. This allows for the detection of any inappropriate or unauthorized actions that might occur due to the lack of enforced separation of duties. By regularly reviewing these logs, the organization can identify unusual or conflicting transactions, which is crucial when the application itself cannot enforce the necessary controls. While establishing delegated authorities, periodically validating user entitlements, and developing user access policies are important, they do not directly address the issue of enforcement in the same way as active monitoring of transaction logs.
C is correct as monitoring transation logs can happen in near real time and violation can be captured. Periodic validation is reactive and could be manual.
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Kennethlim79
1 month, 1 week agokrishccie
3 months, 2 weeks agoHS2804
4 months agoVudusa
5 months, 1 week ago