Your company decides to implement fine-grained attribute-based access control (ABAC) and separate data and resources into micro-segments. Which of the following best describes this initiative in terms of risk treatment?
A. Risk avoidance
B. Risk share
C. Risk modification
D. Risk retention
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
My suggested answer is C. Risk modification.
ABAC and micro-segments are implemented to mitigate/modify risks or reduce their uncertainty and/or effect (impact). This question follows ISO 27005 and uses its terminologies to describe the risk treatment options (risk response strategies).
Risk Context and Glossary
Risk management can be conducted in various contexts, e.g., different levels/tiers (organization, business processes, or information systems) or functions (financial, HR, or information security). It’s crucial to create a common glossary to communicate risk effectively. There are many risk management frameworks or standards that provide a shared glossary, such as ISO 31000, ISO 27005, NIST FARM, COSO, and PMI PMBOK.
The Effective CISSP: Security and Risk Management has more details.
- Network Access Control
- Captive portal
- Honeypot (computing)
- What is an Intrusion Prevention System – IPS
A BLUEPRINT FOR YOUR SUCCESS IN CISSP
My new book, The Effective CISSP: Security and Risk Management, helps CISSP aspirants build a solid conceptual security model. It is not only a tutorial for information security but also a study guide for the CISSP exam and an informative reference for security professionals.