An organization has outsourced its IT security management function to an external service provider. The BEST party to own the IT security controls under this arrangement is the:
D.
According to ISACA, when an organization outsources its IT security management function to an external service provider, the service provider’s IT security function is the best party to own the IT security controls under this arrangement. The service provider’s IT security function should be responsible for ensuring that the organization’s IT security controls are implemented and maintained in accordance with the agreed-upon service level agreements (SLAs) .
According to ISACA, when an organization outsources its IT security management function to an external service provider, the service provider’s IT security function is the best party to own the IT security controls under this arrangement. The service provider’s IT security function should be responsible for ensuring that the organization’s IT security controls are implemented and maintained in accordance with the agreed-upon service level agreements (SLAs) .
A. organization's risk function
Even when an organization outsources its IT security management function, the ultimate responsibility for the organization's security posture remains with the organization itself. The service provider can be in charge of day-to-day management, but the organization's risk function should own the IT security controls. This is because the risk function understands the organization's risk tolerance and business objectives, and therefore is best positioned to ensure the controls meet these requirements.
Even if the service provider implements, manages, or monitors controls, it's the organization's responsibility to ensure they are adequate and functioning correctly. Outsourcing security functions doesn't relieve the organization of the responsibility for its own security.
The IT Security function should be separate from the main IT function. The third party should not own the control as in this case they are the control, as it were. Leaves A.
Sorry, I rectify by 'A'.
The risk function is responsible for identifying and managing risks that could impact the organization's business objectives. It has a broader view of the organization's risk landscape and is best positioned to oversee the IT security controls that are in place to mitigate those risks. Additionally, the risk function typically has the authority to make decisions that affect the organization's risk posture and can ensure that the IT security controls implemented by the external service provider are aligned with the organization's overall risk management strategy.
Have you ever seen Risk unit being the Owner of the implemented controls? They are not for that, ownership would be with someone who actually is taking care of it. I'd say, it would be either IT or IT Security. But as we outsourced it, why would the ownership be still wit the organization? Responsibility is another thing, I show my due care driven by the responsibility making e.g. regular vendor audits, but all the operational burden that is related to the controls' ownership should be within the vendor, isn't it?
Ownership will also be with the organization and never with the outsourced vendor or contractor. And with ownership comes accountability. So no matter who is responsible for operational duties and processes, the actual ownership lies with the organisation.
upvoted 2 times
...
...
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ankitislucky
6Â days, 3Â hours agoeblue
4Â months agoeblue
4Â months ago01010100
5Â months, 1Â week agoCbtL
9Â months, 2Â weeks agojohn_boogieman
10Â months, 2Â weeks agohelg420
10Â months, 2Â weeks agoJco
1Â year, 1Â month agotsangckl
1Â year, 9Â months agoKhy
2Â years, 8Â months agoBeeSz
2Â years, 6Â months agofora
1Â year, 10Â months agojohn_boogieman
11Â months agoCeecil1959
1Â year, 8Â months ago