The data will be hosted and managed outside of the energy organization’s geographical location.
The number of users accessing the system will be small, and no sensitive data will be hosted in the SaaS platform.
Which of the following should the project’s security consultant recommend as the NEXT step?
A . Develop a security exemption, as the solution does not meet the security policies of the energy organization.
B . Require a solution owner within the energy organization to accept the identified risks and consequences.
C . Mititgate the risks by asking the vendor to accept the in-country privacy principles and modify the retention period.
D . Review the procurement process to determine the lessons learned in relation to discovering risks toward the end of the process.
Answer: B
Leave a Reply