Domain 3: Information Security Program Review — 24 of 47

Domain 3 – Section A Review: Information Security Program Development

CISM Domain 3 — Information Security Program Section A Review 15–20 min

This section integrates:

  • Security Program Resources
  • Asset Identification & Classification
  • Industry Frameworks
  • Policies, Procedures & Guidelines
  • Security Program Metrics

CISM evaluates whether you can build a sustainable, risk-aligned security program.


1. Program Resources Must Align With Risk

A mature security program balances:

  • People
  • Process
  • Technology

Key principles:

  • Roles must be clearly defined.
  • Staffing must match risk exposure.
  • Tools must support documented processes.
  • Budget must align with strategic priorities.

Technology cannot compensate for governance gaps.


2. Asset Identification Drives Protection

You cannot protect what you have not identified.

Effective asset management requires:

  • Formal inventory
  • Business ownership
  • Classification based on impact
  • Periodic review
  • Alignment with risk management

Misclassification leads to control misalignment.


3. Frameworks Provide Structure — Not Security

Frameworks:

  • Standardize control expectations
  • Support compliance
  • Enable maturity tracking

But:

  • Must be tailored
  • Must align with enterprise risk
  • Must match organizational capacity
  • Must be phased realistically

Adoption without alignment creates operational strain.


4. Policies Establish Authority

Governance hierarchy:

  • Policy (what & why)
  • Procedure (how)
  • Guideline (recommended approach)

Effective policy requires:

  • Executive approval
  • Clear ownership
  • Enforcement mechanisms
  • Periodic review
  • Risk alignment

Documentation without governance support fails.


5. Metrics Must Demonstrate Effectiveness

Effective metrics:

  • Align with risk appetite
  • Measure outcomes
  • Track trends
  • Support executive reporting
  • Trigger action

Activity metrics alone do not demonstrate maturity.


Section A Decision Pattern

When unsure:

  1. Align with enterprise risk.
  2. Ensure executive sponsorship.
  3. Confirm defined ownership.
  4. Build process before tools.
  5. Measure what matters.

If an answer overemphasizes technology, it is usually wrong.


Section A — Practice Questions

Question 1

A CISO proposes purchasing advanced detection tools despite unclear incident response procedures.

What should occur FIRST?

  1. Approve tool acquisition
  2. Hire additional analysts
  3. Establish documented response processes
  4. Increase monitoring
Answer & Explanation

Correct Answer: C

Process must precede technology.


Question 2

Sensitive data is stored across multiple platforms with no assigned business owner.

What is the PRIMARY risk?

  1. Encryption weakness
  2. Lack of accountability and classification oversight
  3. Monitoring delay
  4. Vendor inefficiency
Answer & Explanation

Correct Answer: B

Ownership drives protection and governance.


Question 3

An organization adopts a complex framework beyond its staffing capacity.

What is the MOST significant risk?

  1. Increased compliance
  2. Reduced automation
  3. Vendor misalignment
  4. Implementation failure due to insufficient resources
Answer & Explanation

Correct Answer: D

Framework adoption must align with maturity and capacity.


Question 4

Security policies are drafted without executive approval.

What is the PRIMARY governance weakness?

  1. Lack of authority and enforceability
  2. Encryption deficiency
  3. Monitoring delay
  4. Vendor oversight
Answer & Explanation

Correct Answer: A

Policies require executive sponsorship to be enforceable.


Question 5

Metrics track vulnerability counts but not reduction in business impact.

What is missing?

  1. Increased scanning
  2. Outcome-based performance metrics
  3. Encryption controls
  4. Vendor reporting
Answer & Explanation

Correct Answer: B

Metrics must demonstrate effectiveness, not just activity.


Question 6

Asset classification has not been reviewed despite major business expansion.

What is the PRIMARY concern?

  1. Vendor inefficiency
  2. Encryption gap
  3. Misalignment between asset value and control protection
  4. Monitoring frequency
Answer & Explanation

Correct Answer: C

Classification must evolve with business changes.


Question 7

Security roles overlap with unclear reporting lines.

What is the MOST significant risk?

  1. Accountability gaps and ineffective program governance
  2. Encryption weakness
  3. Vendor delay
  4. Increased automation
Answer & Explanation

Correct Answer: A

Clear roles are essential for program maturity.


Question 8

Board reporting focuses exclusively on technical metrics.

What is the PRIMARY improvement needed?

  1. More technical detail
  2. Reduce reporting frequency
  3. Increase vulnerability scanning
  4. Translate metrics into enterprise risk posture
Answer & Explanation

Correct Answer: D

Board reporting must align with strategic oversight.


Question 9

Procedures are routinely bypassed because they are impractical.

What is the MOST appropriate action?

  1. Enforce penalties
  2. Review and adjust procedures to align with operational reality
  3. Eliminate policies
  4. Increase automation
Answer & Explanation

Correct Answer: B

Procedures must be realistic to ensure compliance.


Question 10

Security invests heavily in tools but experiences high staff turnover and low morale.

What is the PRIMARY program risk?

  1. Unsustainable program capability
  2. Encryption gap
  3. Vendor inefficiency
  4. Monitoring deficiency
Answer & Explanation

Correct Answer: A

People are foundational to program sustainability.


Section A Pattern Summary

In Domain 3 Section A:

  • People define capability.
  • Asset identification defines protection.
  • Frameworks provide structure.
  • Policies establish authority.
  • Metrics demonstrate effectiveness.

CISM rewards structured, sustainable program design — not tool accumulation.

Next Module Module 18: Information Security Control Design and Selection