Of the following, who should own the risk associated with unauthorized access to application data?
Of the following, who should own the risk associated with unauthorized access to application data?
The application owner should own the risk associated with unauthorized access to application data. This is because the application owner is responsible for the overall management, security, and performance of the application. They have the comprehensive understanding necessary to assess the business context, data sensitivity, and access requirements, making them best suited to implement proper controls, monitoring, and risk mitigation strategies.
C - The application owner is responsible for the overall management, security, and performance of the application. They understand the business context, data sensitivity, and access requirements. Owning the risk ensures proper controls, monitoring, and mitigation.