If the org is already required by policy or regulation to do external QA reviews (which is standard in most places), not having that makes A a bigger red flag. In rare cases where it's not required, D could technically impact results more directly, but for CISA purposes I think A is right. Disagree?
I don’t think it’s B. C is the bigger issue here because admin rights let users make unauthorized changes, which messes with both integrity and availability. B just covers viewing data, but C can lead to way worse breaches. Some might pick D for open-licensed software but that risk usually isn’t greater than allowing anyone to change configs. Open to other takes though.
Option C makes sense. If IT strategy is only following trends and not aligning with actual business objectives, that's a huge risk. The point is to support the organization's needs, not just chase what’s new in the market. Pretty sure that's the biggest red flag here. Agree?
I don’t think it’s D. I picked B since business case development should stop people from buying stuff they don’t really need in the first place. Seems like if you have that up front, you avoid shelfware entirely. Maybe I’m missing how ongoing life cycle steps would catch it later, but B seems closer to root cause for me. Agree?
C/D? Both are issues, but I remember seeing something like this before and D was flagged as the bigger problem. Without standardized formats, you can't do effective correlation or automated analysis. C is annoying for auditors, but with standard formats you can still parse everything. Not 100% though, open to other views.
Had something like this in a mock. C makes sense since log can't be altered, which is the main thing for integrity. Rest are good but not enough to guarantee original data.