CRISC 2022 Domain3
CRISC 2022 Domain3
Exam Relevance
The domain represents 32% of
the CRISC examination 22
(approximately 48 questions). 26
20
32
Domain 1 Domain 2
Domain 3 Domain 4
Topics
Risk and Control Ownership
Risk Treatment/Risk Response Options
Managing Risk from Processes, Third Parties and Emergent
Sources
Control Types, Standards and Frameworks
Control Design, Selection and Analysis
Control Implementation, Testing and Effectiveness Evaluation
Risk Treatment Plans
Data Collection, Aggregation, Analysis and Validation
Risk and Control Monitoring and Reporting Techniques
Performance, Risk and Control Metrics
Learning Objectives
Determine roles accountable for risk and control ownership.
Address risk originating from outside the enterprise (or from third
parties).
Learning Objectives
Identify the current state of existing controls and evaluate their
effectiveness for IT risk mitigation.
Describe the types of risk data available to monitor and report risk.
Learning Objectives
Identify types of control assessments.
1
Every risk identified in the risk register should have a specified
owner at a management level empowered to make decisions on
behalf of the enterprise.
3
Clearly convey current and anticipated levels of risk to provide
insight into the aggregate risk facing the enterprise.
Review Question
When aligning controls with business objectives, what is MOST
important?
10
10
Every risk should have a single risk owner, seek May own controls and are accountable for ensuring that
consensus if multiple areas are impacted risk control effectiveness is monitored
Accountability extends beyond the basic risk May be required to prepare reports about that risk due
response decision to approving specific controls to laws or regulations
when mitigation is the response.
11
11
12
12
The goal of risk response is to bring risk into alignment with the organizational risk appetite and tolerance
13
13
Sharing/
Acceptance Transfer
Mitigation Avoidance
All response activities incur some cost, typically a mix of the direct cost of
response and the potential cost of impact. Finding the right balance is a
14 management function that considers the enterprise constraints.
14
Review Question
When responding to an identified risk event, the MOST important
stakeholders involved in reviewing risk response options to an IT risk
are the:
B. internal auditors
D. business managers
15
15
A risk may be acceptable but also have Selection response is usually based on
potential for mitigation to improve value obtained for the cost and is
operational efficiency. documented in business cases.
Perform cost/benefit or ROI calculations to Document risk response in the risk register,
help guide decision making. including accountability and timeframes to
aid in tracking progress.
16
16
17
17
Review Question
When a risk cannot be sufficiently mitigated through manual or
automatic controls, which of the following options will BEST protect
the enterprise from the potential financial impact of the risk?
18
18
19
19
20
20
21
21
Review Question
Which of the following BEST ensures that appropriate mitigation
occurs on identified information systems vulnerabilities?
22
22
Configuration Management
23
23
Release Management
Exception Management
In environments where software is developed Enterprises may find situations where usual
for internal use, formal management of new practices are unsuitable due to timely technical or
updates or version releases of developed administrative constraints.
applications is crucial. Exceptions represent deviation from standards
Releases should be: and introduce complexity (creating or obscuring
• Coordinated with production staff risk).
• Subject to independent (nondeveloper) Exceptions should be:
verification and protection before • Documented and approved by senior or
deployment executive management
• Aligned with the enterprise overall life cycle • Reviewed annually for relevance to remove
for system development unnecessary exceptions
24
24
Review Question
Monitoring has flagged a security exception. What is the MOST
appropriate action?
25
25
26
26
27
27
28
28
Review Question
An enterprise has outsourced several business functions to a firm in
another country, including IT development, data hosting and support.
What is the MOST important question the risk professional will ask in
relation to the outsourcing arrangements?
29
29
30
30
30
31
31
Review Question
What is the MOST important control that should be in place to
safeguard against the misuse of the corporate social media account?
B. Two-factor authentication
C. Awareness training
D. Strong passwords
32
32
Emerging technology has significant effects Previously effective controls may be rendered
on the design and implementation of controls obsolete with advances in computing power or
(positive or negative). improvements in algorithmic design.
Organizational risk profiles are subject to If alternate channels for data movement exist,
sudden and potentially severe changes. organizations may find that their risk profiles
have expanded far beyond expectation.
33
33
34
34
35
35
Control Categories
01
Deterrent Corrective
36
36
Review Question
Which of the following categories of information security controls
addresses a deficiency or weakness in the control structure of an
enterprise?
A. Corrective
B. Preventive
C. Compensating
D. Directive
37
37
38
38
39
39
Review Question
System backup and restore procedures can BEST be classified as:
A. Technical controls
B. Detective controls
C. Corrective controls
D. Deterrent controls
40
40
41
41
Adoption of standards and frameworks facilitates Standards may also include or be supported by
the process of selecting controls by specifying frameworks, with sets of recommended controls
what should be done and directing how to do it. for implementation, if chosen by the enterprise.
42
42
01 02 03 04
Set realistic long-term Compare the state of Following defined, Consistently apply policies
goals for risk the enterprise risk reliable processes allows and procedures to drive
management by having management program the enterprise to prevent, improvements in efficiency
a clear understanding of to an established model detect and recover and effectiveness of risk
their current maturity. of capability maturity. rapidly from incidents management capabilities.
43
43
Review Question
Which of the following choices BEST assists a risk practitioner in
measuring the existing level of development of risk-management
processes against their desired state?
C. A balanced scorecard
44
44
45
45
Review a recent audit report to use as the starting point for self
assessments, identifying any changes in the environment.
46
46
Closes the gap between the current An effective control is one that prevents,
state and an acceptable level of risk detects or contains an incident, or
enables recovery from a risk event.
47
47
Proactive Reactive
48
48
Review Question
A PRIMARY reason for initiating a policy-exception process is:
49
49
Adjusting Controls
Current controls may not be sufficient to adequately protect the enterprise.
50
50
51
51
Control Testing
Test selected Use a realistic Test all types
controls in distinct context of controls
environment
52
52
Review Question
Which of the following choices should be considered FIRST when
designing information system controls?
53
53
Control Implementation
Operating the new and old Replace components or Single-instant movement from
systems simultaneously modules in old systems with old systems to new systems
new or modified components
Allows project team greater
ease to test reliability and Riskiest of changeover
Provides safest and quickest processes due to potential for
performance of new systems means of changeover in case lost opportunities in business
of rollback processing
Allows staff time to learn and
take training for new systems More difficult to implement Proactively communicate to
Higher maintenance cost and because test environments stakeholders and update
monitoring requirement due may not accurately represent documentation or training in
to multiple systems the state of production advance of changeover
54
54
Fallback or Rollback
Every changeover should account for the possibility of a fallback (rollback) scenario.
55
55
Review Question
The implementation of unjustified controls is MOST likely to result in:
56
56
57
57
Postimplementation Review
A timely postimplementation review offers the best opportunity to capture lessons learned so that they
can be applied to future projects. Not all lessons may be evident right away. Assess changes over time
to assess effectiveness and value.
What went well during the project, and what could have been done better?
Did the project bring the risk within acceptable risk levels?
If any inadequacies or deficiencies have been identified, how might these be addressed now?
Were specified methodologies, standards and techniques followed? If not, why not?
Were the project targets accomplished in terms and resources or were additional ones needed?
58
58
59
59
Control Testing
Control testing provides an opportunity to uncover flaws early
enough to more cost-effectively prevent potential failures.
Test controls at as many Include good practices based Testing can be progressive
levels as needed to assess on standards used at each (looking for flaws) or regressive
the complete scope. level and the results of all (working backward from known
tests formally documented. flaws).
60
60
Environmental
Data Version Control
Separation
Allow testing of all possible Prevent potential for cross- Assignment of specific
process functions and error population of data or version numbers or tracking
handling application code outside the mechanisms for each revision
approval process
Ensures source code cannot Reveal certain errors that Assess how components work
be modified or tampered with can be remedied before together with their interfaces
after approval for final testing moving to integration and deliver overall operational
capability
61
61
Review Question
A financial institution is undergoing testing of its electronic funds
transfer (EFT) system after major enhancements. The risk
practitioner would MOST benefit from a test that:
62
62
Highlights problems
unanticipated by the
requirements process
63
63
2
Failure in QA suggests flaws in the processes for development
and execution
64
64
65
65
Control
By keeping the risk register accurate and up to date, the risk practitioner ensures that it is
consistently available as a resource for risk management activities across the enterprise.
66
66
67
67
68
68
Review Question
Which of the following is the MOST important information to include
in a risk treatment plan that already has an appropriate resolution and
a date for completion?
A. responsible personnel.
B. mitigating factors.
C. likelihood of occurrence.
D. cost of completion.
69
69
Risk Mitigation
When mitigation is the chosen response, making decisions can be
difficult and often requires a method of comparing control options.
70
70
Run risk treatment planning as a project Explain that changes in delivery of any
with a defined start and end date project element on the critical path affects
delivery of the entire project
71
71
Review Question
Which of the following would ensure that critical dependencies are
addressed in the risk treatment plan?
72
72
73
73
Data Collection
Incorrect analysis of
data may lead to an
erroneous conclusion.
74
74
Summary view that may obscure Detailed analysis of original sources may
details present in individual sources reveal patterns not identifiable under
aggregation
Validate data to ensure its quality Where validation fails, investigate if there
is a problem in data retrieval or the
source
75
75
Review Question
Investments in risk management technologies should be based on:
A. audit recommendations.
B. vulnerability assessments.
C. business climate.
D. value analysis
76
76
Logs
Logs, commonly provided by systems, devices and applications, are
the most popular way to capture and store data for analysis.
Used to:
Time synchronized logs can
• Identify security violations assist in correlating events from
multiple sources.
• Aid forensics investigations
• Alert the organization to malicious activity
• Identify the source of an attack Logging also takes time,
potentially decreasing throughput
• Assist in tailored strengthening of controls
for each transaction monitored.
77
77
Observe production
system operation to
ensure correct processing
78
78
79
Review Question
How can an enterprise determine the aggregated risk from several
sources? Through a:
80
80
81
81
1 3
Ensure logs are
Ensure processes, Ensure capability to When using MSSP or
enabled, controls can
logs and audit hooks monitor a control and SEIM, enable data
be tested, and regular
are commonly placed support monitoring is capture and staff
reporting procedures
into the control addressed in control notification features
are developed
framework design.
2 4
82
82
Control Monitoring
Set up an IS control monitoring process reflecting objectives,
scopes and methods consistent with enterprise objectives
Align mandated controls with IT security Encourage each process owner to take
and related enterprise policies, subject to ownership of control improvement through
a regular review and revision process. a continuing program of self-assessment.
83
83
Identify and confirm risk control Engage with stakeholders and Align and maintain evaluation
communicate requirements and monitoring approach with
owners and stakeholders.
and objectives. IT and enterprise approaches
Establish monitoring Determine life cycle management Request, prioritize and allocate
processes and procedures. and change control processes. resources for monitoring.
84
Review Question
Which of the following assessments of an enterprise’s risk monitoring
process will provide the BEST information about its alignment with
industry-leading practices?
B. A self-assessment of capabilities
85
85
86
86
Effective control monitoring relies on the accuracy and completeness of the data provided for
monitoring and evaluation. Data must be genuine and free from errors or misstatements.
Penetration Test
87
87
88
88
Report Types
Heatmaps Dashboards
Scorecards
89
89
Review Question
Which of the following BEST helps while presenting the current risk
profile to executive management and the board of directors?
90
90
91
91
92
92
Review Question
Which of the following choices is the BEST measure of the
operational effectiveness of risk-management process capabilities?
C. Base practices
D. Metric thresholds
93
93
Measurement
Appetite Mitigation
and reporting
94
94
KRI Selection
Risk indicators should be identified for all stakeholders, and KRI Flaws:
IT- based metrics should be aligned with other metrics used Not linked to specific risk
in the enterprise to the greatest extent possible. Incomplete or inaccurate due to
unclear specifications
Difficult to measure, aggregate,
Select KRIs carefully and sparingly. Common mistakes compare and interpret
made when implementing KRIs include regarding too many Provide results that cannot be
risk indicators as being KRIs and choosing KRIs that are compared over time
flawed in some way. Not linked to goals
95
95
The effectiveness of KRIs depends in large part on the strength of their metrics.
96
96
Review Question
What is the BEST approach for creating key risk indicators (KRIs) for
quarterly reporting to senior leadership?
97
97
KRI Optimization
For meaningful reporting, ensure thresholds are set correctly and correct data are collected and reported.
Sensitivity Timing
Track system transactions that violate
Automated tool to analyze and report on
defined SoD rules before month-end
access control logs based on severity
processing
98
98
99
99
Review Question
A company has set the unacceptable error level at 10 percent. Which
of the following tools can be used to trigger a warning when the error
level reaches eight percent?
100
100
30
25
20
Days
30-day KPI
15
25-day KRI
10
0
UNIX Windows Other
101
101
102
102
Review Question
Which indicator ensures that the enterprise’s risk is effectively
treated?
103
103
Review Question
An enterprise implemented a new control to mitigate a recurring risk
event. Which of the following would BEST measure the effectiveness
of the implemented control?
104
104
105
105
106
106