Ensuring access rules agree with policies is an information systems security officer’s primary responsibility for business process applications. An information systems security officer should verifythat the access controls implemented for the business process applications are consistent with the organization’s security policy and objectives. The other options are not the primary responsibility of an information systems security officer, but rather the tasks of an application owner, a senior management, or a business analyst. References:
CISA Review Questions, Answers & Explanations Database, Question ID 208
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit