Isaca Certified in the Governance of Enterprise IT Exam CGEIT Question # 90 Topic 10 Discussion
CGEIT Exam Topic 10 Question 90 Discussion:
Question #: 90
Topic #: 10
An enterprise incurred penalties for noncompliance with privacy regulations. Which of the following is MOST important to ensure appropriate ownership of access controls to address this deficiency?
A.
Authenticating access to information assets based on roles or business rules.
B.
Implementing multi-factor authentication controls
C.
Granting access to information based on information architecture
D.
Engaging an audit of logical access controls and related security policies
According to the web search results, authenticating access to information assets based on roles or business rules is the most important way to ensure appropriate ownership of access controls to address privacy compliance. This is because role-based access control (RBAC) and attribute-based access control (ABAC) are two of the most common and effective methods for enforcing the principle of least privilege, which means granting users only the minimum level of access they need to perform their tasks. This can help to protect the confidentiality, integrity, and availability of information assets, as well as to comply with privacy regulations such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). For example, one of the results1 states that "RBAC is a key component of any organization’s compliance strategy, as it helps ensure that only authorized users can access sensitive data and resources". Another result2 explains that "ABAC is a logical model for access control that supports fine-grained authorization based on attributes, environment conditions, and policies". A third result3 discusses how RBAC and ABAC can help organizations achieve privacy compliance by implementing data minimization, purpose limitation, and accountability principles. References :=
What Is Access Control? | Microsoft Security
Access Control Policy and Implementation Guides | CSRC
Understanding Data Privacy – A Compliance Strategy Can Mitigate Cyber …
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit