A cloud service provider utilizes services of other service providers for its cloud service. Which of the following is the BEST approach for the auditor while performing the audit for the cloud service?
An auditor is assessing a European organization's compliance. Which regulation is suitable if health information needs to be protected?
Which of the following is a direct benefit of mapping the Cloud Controls Matrix (CCM) to other international standards and regulations?
What should be the control audit frequency for an organization's business continuity management and operational resilience strategy?
Which of the following would be the GREATEST governance challenge to an organization where production is hosted in a public cloud and backups are held on the premises?
What is an advantage of using dynamic application security testing (DAST) over static application security testing (SAST) methodology?
In all three cloud deployment models, (laaS, PaaS, and SaaS), who is responsible for the patching of the hypervisor layer?
Which of the following methods can be used by a cloud service provider with a cloud customer that does not want to share security and control information?
An auditor identifies that a cloud service provider received multiple customer inquiries and requests for proposal (RFPs) during the last month.
Which of the following should be the BEST recommendation to reduce the provider's burden?
Which of the following would be considered as a factor to trust in a cloud service provider?
An independent contractor is assessing the security maturity of a Software as a Service (SaaS) company against industry standards. The SaaS company has developed and hosted all its products using the cloud services provided by a third-party cloud service provider. What is the optimal and most efficient mechanism to assess the controls provider is responsible for?
To promote the adoption of secure cloud services across the federal government by
What legal documents should be provided to the auditors in relation to risk management?
The MOST critical concept for managing the building and testing of code in DevOps is:
Which of the following approaches encompasses social engineering of staff, bypassing of physical access controls, and penetration testing?
Which of the following provides the BEST evidence that a cloud service provider's continuous integration and continuous delivery (CI/CD) development pipeline includes checks for compliance as new features are added to its Software as a Service (SaaS) applications?
When an organization is using cloud services, the security responsibilities largely vary depending on the service delivery model used, while the accountability for compliance should remain with the:
Regarding cloud service provider agreements and contracts, unless otherwise stated, the provider is:
The CSA STAR Certification is based on criteria outlined the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) in addition to:
When reviewing a third-party agreement with a cloud service provider, which of the following should be the GREATEST concern regarding customer data privacy?
Which of the following has the MOST substantial impact on how aggressive or conservative the cloud approach of an organization will be?
Which of the following is the BEST control framework for a European manufacturing corporation that is migrating to the cloud?
An auditor is reviewing an organization’s virtual machines (VMs) hosted in the cloud. The organization utilizes a configuration management (CM) tool to enforce password policies on its VMs. Which of the following is the BEST approach for the auditor to use to review the operating effectiveness of the password requirement?
Which of the following has been provided by the Federal Office for Information Security in Germany to support customers in selecting, controlling, and monitoring their cloud service providers?
To assist an organization with planning a cloud migration strategy to execution, an auditor should recommend the use of:
An organization currently following the ISO/IEC 27002 control framework has been charged by a new CIO to switch to the NIST 800-53 control framework. Which of the following is the FIRST step to this change?
To qualify for CSA STAR attestation for a particular cloud system, the SOC 2 report must cover:
When applying the Top Threats Analysis methodology following an incident, what is the scope of the technical impact identification step?
Which of the following are the three MAIN phases of the Cloud Controls Matrix (CCM) mapping methodology?
The three layers of Open Certification Framework (OCF) PRIMARILY help cloud service providers and cloud clients improve the level of:
If a customer management interface is compromised over the public Internet, it can lead to:
An organization that is utilizing a community cloud is contracting an auditor to conduct a review on behalf of the group of organizations within the cloud community. Of the following, to whom should the auditor report the findings?
One of the control specifications in the Cloud Controls Matrix (CCM) states that "independent reviews and assessments shall be performed at least annually to ensure that the organization addresses nonconformities of established policies, standards, procedures, and compliance obligation." Which of the following controls under the Audit Assurance and Compliance domain does this match to?
During an audit, it was identified that a critical application hosted in an off-premises cloud is not part of the organization's disaster recovery plan (DRP). Management stated that it is responsible for ensuring the cloud service provider has a plan that is tested annually. What should be the auditor's NEXT course of action?
Which of the following is the BEST method to demonstrate assurance in the cloud services to multiple cloud customers?
Which of the following is a detective control that may be identified in a Software as a Service (SaaS) service provider?
Which of the following attestations allows for immediate adoption of the Cloud Controls Matrix (CCM) as additional criteria to AICPA Trust Service Criteria and provides the flexibility to update the criteria as technology and market requirements change?
From the perspective of a senior cloud security audit practitioner in an organization with a mature security program and cloud adoption, which of the following statements BEST describes the DevSecOps concept?
"Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls." Which of the following types of controls BEST matches this control description?
is it important for the individuals in charge of cloud compliance to understand the organization's past?
Which of the following standards is designed to be used by organizations for cloud services that intend to select controls within the process of implementing an information security management system based on ISO/IEC 27001?
Which of the following is MOST important to manage risk from cloud vendors who might accidentally introduce unnecessary risk to an organization by adding new features to their solutions?
Which industry organization offers both security controls and cloud-relevant benchmarking?
An organization is using the Cloud Controls Matrix (CCM) to extend its IT governance in the cloud. Which of the following is the BEST way for the organization to take advantage of the supplier relationship feature?
Supply chain agreements between a cloud service provider and cloud customers should, at a minimum, include: