MultipleChoice
Which of the following is an example of a corrective control?
OptionsMultipleChoice
To ensure that cloud audit resources deliver the best value to the organization, the PRIMARY step would be to:
OptionsMultipleChoice
Which of the following attestation allows for immediate adoption of the Cloud Control Matrix (CCM) as additional criteria to AICPA Trust Service Criteria and provides the flexibility to update the criteria as technology and market requirements change?
OptionsMultipleChoice
When developing a cloud compliance program, what is the PRIMARY reason for a cloud customer to review which cloud services will be deployed?
OptionsMultipleChoice
While performing the audit, the auditor found that an object storage bucket containing PII could be accessed by anyone on the Internet. Given this discovery, what should be the most appropriate action for the auditor to perform?
OptionsMultipleChoice
Which of the following is MOST important to consider when developing an effective threat model during the introduction of a new SaaS service into a customer organization's architecture? The threat model:
OptionsMultipleChoice
From the perspective of a senior cloud security audit practitioner in an organization of a mature security program with cloud adoption, which of the following statements BEST describes the DevSecOps concept?
OptionsMultipleChoice
The MAIN difference between Cloud Control Matrix (CCM) and Consensus Assessment Initiative Questionnaire (CAIQ) is that:
OptionsMultipleChoice
Which of the following approaches encompasses social engineering of staff, bypassing of physical access controls and penetration testing?
OptionsMultipleChoice
Policies and procedures shall be established, and supporting business processes and technical measures implemented, for maintenance of several items ensuring continuity and availability of operations and support personnel. Which of the following controls BEST matches this control description?
Options