CISSP-ISSEP Exam Practice: Process Culminating in Adequate Protection Controls Agreement

The Importance of Establishing Adequate Protection Controls

Question

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls.

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

The process that culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls is Certification and Accreditation (C&A).

Certification and Accreditation is a systematic process used to evaluate, verify and confirm that a system, application or network meets specific security requirements and provides adequate protection against potential security threats.

During the C&A process, security controls and safeguards are assessed to determine if they are sufficient to protect the system against identified risks and threats. The process involves several steps including the following:

  1. Initiation: In this phase, the need for certification and accreditation is determined, and the scope and objectives of the process are defined.

  2. Security categorization: This phase involves identifying the system's security categorization based on factors such as the type of information processed, stored, or transmitted by the system.

  3. Security control selection: This phase involves identifying and selecting appropriate security controls to protect the system based on the system's security categorization.

  4. Risk assessment: This phase involves identifying potential threats and vulnerabilities, assessing their likelihood and impact, and determining the level of risk associated with the system.

  5. Security control implementation: This phase involves implementing and testing the selected security controls to ensure that they are effective in mitigating identified risks.

  6. Security control monitoring: This phase involves ongoing monitoring of the implemented security controls to ensure they remain effective over time.

  7. Certification: This phase involves assessing the effectiveness of the implemented security controls and determining whether the system meets the security requirements.

  8. Accreditation: This phase involves making a risk-based decision to authorize the system to operate based on the results of the certification process.

Once the C&A process is complete, an agreement between key players is reached that the system in its current configuration and operation provides adequate protection controls. This agreement is based on the assessment and verification of the system's security controls and the risks associated with its operation.

Therefore, the correct answer to the question is A. Certification and accreditation (C&A).