While security administrators (option A) may play a role in implementing and managing user authorization controls, system owners typically have a more direct stake in the specific systems and are responsible for ensuring that access permissions align with business needs and security policies. Therefore, system owners are the MOST appropriate staff for ensuring the alignment of user authorization tables with approved authorization forms.
The answer to this question is A. Security administrators. Security administrators are responsible for managing the access rights and privileges of users in an information system. They ensure that the user authorization tables are consistent with the approved authorization forms, which specify the roles and permissions of each user. Security administrators also monitor and audit the user activities and enforce the security policies and standards.
System owners, database administrators (DBAs), and IT managers are not directly involved in the user authorization process, although they may have some roles and responsibilities related to the security of the system. System owners are accountable for the overall performance and functionality of the system, DBAs are in charge of the design and maintenance of the database, and IT managers oversee the IT resources and staff.
when Security administrators or DBAs are responsible to enforce technical means of access control, they are not the one able to decide which users may access what data, this is up the data owners, or the system owners, and this because it is a business decision.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
blues_lee
2 months, 3 weeks agoSwallows
5 months, 2 weeks ago3008
1 year, 3 months agoChaBum
8 months, 2 weeks agopeelu
1 year, 11 months ago