Exam CISM All QuestionsBrowse all questions from this exam
Question 988

Which of the following MUST be established to maintain an effective information security governance framework?

    Correct Answer: C

    Security policy provisions are essential for establishing an effective information security governance framework. They provide the overarching rules and guidelines that ensure the confidentiality, integrity, and availability of information within an organization. These provisions set the foundation for implementing security controls, defining security metrics, and managing changes in a structured and controlled manner. Without clear security policies, it is difficult to maintain a cohesive and effective security strategy.

Discussion
CISSPSTOption: C

Policies are the statement of management intent and are at the core of governance. Without policies anything the metrics measure would be irrelevant.

SoleandheelOption: C

C. Security policy provisions

koala_layOption: C

Security policy provisions outline the rules and guidelines for ensuring the confidentiality, integrity, and availability of information within an organization. These provisions help establish the overall direction and goals of the information security program. They provide a framework for implementing security controls, defining security metrics, and managing changes in a consistent and controlled manner.

arafatms2000Option: D

Defined security metrics

Marcelus1714Option: D

Defined security metrics.

richck102Option: D

D. Defined security metrics

richck102

C. Security policy provisions

oluchecpointOption: C

C. Security policy provisions Establishing security policy provisions is a fundamental requirement for maintaining an effective information security governance framework. Security policies define the organization's approach to managing security and provide guidelines for protecting information and assets. These policies cover various aspects of information security, including data protection, access control, incident response, and compliance requirements. Without clear and well-defined security policy provisions, it is challenging to ensure a consistent and comprehensive approach to information security within an organization.