Scenario:
A manufacturing company faced a risk of production delays due to potential supply chain disruptions. After assessing the potential impact, the company concluded the disruption was unlikely to significantly affect operations. The company decided to accept the risk.
Which risk treatment option did the company select in this case?
Answer : B
According to ISO/IEC 27001:2022 Clause 6.1.3 (a), an organization must determine appropriate risk treatment options. ISO 27005:2022 (Clause 8.2.2) defines risk retention as:
''The decision to accept the risk without taking any action to reduce it, often because the cost of mitigation is greater than the benefit.''
The company assessed the likelihood and impact of the risk and decided not to mitigate, which qualifies as risk retention (also known as risk acceptance in ISO 27001 Clause 6.1.3(f)).
ISO/IEC 27001:2022 Clause 6.1.3 (f)
ISO/IEC 27005:2022 Clause 8.2.2 -- Risk treatment options===========
An organization has implemented a control that enables the company to manage storage media through their life cycle of use. acquisition, transportation and disposal. Which control category does this control belong to?
Answer : B
According to ISO/IEC 27001:2022, the control that enables the organization to manage storage media through their life cycle of use, acquisition, transportation and disposal belongs to the category ofphysical and environmental security. This category covers the controls that prevent unauthorized physical access, damage and interference to the organization's information and information processing facilities.The specific control objective for this control isA.11.2.7 Secure disposal or reuse of equipment1, which states that 'equipment containing storage media shall be checked to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or reuse.'2
ISO/IEC 27001:2022, Annex A
ISO/IEC 27002:2022, clause 11.2.7
Scenario 1: NobleFind is an online retailer specializing in high-end, custom-design furniture. The company offers a wide range of handcrafted pieces tailored to meet the needs of residential and commercial clients. NobleFind also provides expert design consultation services. Despite NobleFind's efforts to keep its online shop platform secure, the company faced persistent issues, including a recent data breach. These ongoing challenges disrupted normal operations and underscored the need for enhanced security measures. The designated IT team quickly responded to resolve the problem. To address these issues, NobleFind decided to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 to improve security, protect customer data, and ensure the stability of its services.
In addition to its commitment to information security, NobleFind focuses on maintaining the accuracy and completeness of its product dat
a. This is ensured by carefully managing version control, checking information regularly, enforcing strict access policies, and implementing backup procedures. Moreover, product details and customer designs are accessible only to authorized individuals, with security measures such as multi-factor authentication and data access policies.
NobleFind has implemented an incident investigation process within its ISMS, as part of its comprehensive approach to information security. Additionally, it has established record retention policies to ensure that online information about each product and client information remains readily accessible and usable on demand for authorized entities. NobleFind established an information security policy offering clear guidelines for safeguarding historical data. It also insisted that personnel sign confidentiality agreements and were committed to recruiting only qualified individuals. Additionally, NobleFind implemented measures for monitoring the resources used by its systems, reviewing user access rights, and conducting a thorough analysis of audit logs to swiftly identify and address any security anomalies.
With its ISMS in place, NobleFind maintains and safeguards documented information, encompassing a wide range of data, records, and specifications. This documented information is vital to its operations, ensuring the security and integrity of customer data, historical records, and financial information.
According to scenario 1, which detective control did NobleFind implement?
Answer : B
Detective controls are designed to identify and detect undesirable events or incidents that have occurred so that appropriate corrective actions can be taken. ISO/IEC 27001:2022 and its implementation guidance define detective controls as mechanisms that 'identify the occurrence of events or incidents and provide evidence or alerts' (see ISO/IEC 27002:2022, Introduction 0.2, and 6.8, 'Audit logging').
Conducting a thorough analysis of audit logs is a classic detective control. By regularly reviewing audit logs, an organization can identify suspicious activities, policy violations, or operational anomalies that may indicate a security incident.
ISO/IEC 27001:2022, Annex A, A.8.15 (Logging):
'Event logs recording user activities, exceptions, faults, and information security events shall be produced, kept and regularly reviewed.'
ISO/IEC 27002:2022, 8.15 (Logging):
'Regular review and analysis of logs should be performed to detect and respond to inappropriate or anomalous activities.'
ISO/IEC 27001:2022, Annex A, A.8.15
ISO/IEC 27002:2022, 8.15 and Introduction 0.2
NoAVision is a mid-sized cybersecurity solutions provider based in Tartu, Estonia, with satellite offices in Stockholm and Berlin. The company specializes in secure cloud hosting, identity and access management (IAM), and digital certificate lifecycle management. Its clients span the government, financial services, and healthcare sectors, including national ministries, private hospitals, and fintech firms operating across the European Economic Area (EEA). To have a structured approach to safeguarding sensitive information, NoAVision decided to implement an information security management system (ISMS) based on ISO/IEC 27001. During the planning and design phases, the company relied on an ISO guidance document that interpreted each clause of the standard. Rather than introducing additional requirements, the document offered practical recommendations, implementation alternatives, and contextual insights, enabling the company to avoid ambiguity and develop a functional ISMS.
Which document did NoAVision rely on during the planning and design phases of the ISMS implementation?
Answer : C
ISO/IEC 27003 is the official guidance document for ISO/IEC 27001. It interprets each clause of the standard without introducing new mandatory requirements. Instead, it provides practical recommendations, implementation options, and contextual insights to help organizations understand and apply each requirement effectively. This aligns perfectly with the scenario description --- the document 'interpreted each clause' and 'offered practical recommendations and implementation alternatives.' ISO/IEC 27701 extends ISO/IEC 27001 for privacy (PIMS), and PCI DSS is a payment card security standard. Neither fits the described role. Per ISO/IEC 27003:2017, it serves as a guide to support organizations in implementing an ISMS in accordance with ISO/IEC 27001 by offering rationale and explanation for each requirement.
================
Scenario 7: Incident Response at Texas H&H Inc.
Once they made sure that the attackers do not have access in their system, the security administrators decided to proceed with the forensic analysis. They concluded that their access security system was not designed tor threat detection, including the detection of malicious files which could be the cause of possible future attacks.
Based on these findings. Texas H$H inc, decided to modify its access security system to avoid future incidents and integrate an incident management policy in their Information security policy that could serve as guidance for employees on how to respond to similar incidents.
Based on the scenario above, answer the following question:
Based on scenario 7. what else should Texas H&H Inc. do when responding to the incident?
Answer : B
Which of the following processes may involve increasing risk in order to pursue an opportunity?
Answer : B
Once they made sure that the attackers do not have access in their system, the security administrators decided to proceed with the forensic analysis. They concluded that their access security system was not designed tor threat detection, including the detection of malicious files which could be the cause of possible future attacks.
Based on these findings. Texas H$H inc, decided to modify its access security system to avoid future incidents and integrate an incident management policy in their Information security policy that could serve as guidance for employees on how to respond to similar incidents.
Based on the scenario above, answer the following question:
Texas M&H Inc. decided to integrate the incident management policy to the existent information security policy. How do you define this situation?
Answer : A