An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
In the case of an IS auditor finding unauthorized access to confidential data by an employee, the best recommendation would be to recommend corrective actions to be taken by the security administrator. This approach directly addresses the identified issue and ensures immediate steps are taken to remedy the situation, securing the data and preventing further unauthorized access. Implementing regular access reviews and other long-term measures are indeed important, but the immediate response should focus on correcting the unauthorized access as soon as it is detected.
A. recommend corrective actions to be taken by the security administrator.
A makes more sense. D comes after.
I think answer D is correct. Auditor recommendations should be a fix for the root cause. Option A suggest corrective actions to fix the problem. Option D suggests to have REGULAR access reviews to prevent this.
While requiring the business owner to conduct regular access reviews (option D) may be a part of the overall security strategy, it is not the immediate and most effective response to address the specific incident of unauthorized access. Option A addresses the issue directly by recommending corrective actions to be taken by the security administrator to mitigate the risk and prevent further unauthorized access to confidential data.
i think the first step should be A. But the best option that this not happen anymore is D.
A is correct.