Domain 3 – Section B Review: Information Security Program Management
This section integrates:
- Control Design and Selection
- Control Implementation and Integration
- Control Testing and Evaluation
- Security Awareness and Training
- External Service Management
- Program Communications and Reporting
CISM evaluates whether you can execute a security program in a governed, sustainable, risk-aligned manner.
1. Controls Must Be Risk-Aligned
Control design should:
- Reflect asset classification
- Reduce risk to within appetite
- Balance preventive, detective, corrective layers
- Consider operational impact
- Be economically rational
The strongest control is not always the best control.
2. Implementation Requires Governance Discipline
Controls must:
- Follow change management
- Engage stakeholders
- Include impact assessment
- Update documentation
- Integrate with architecture
- Assign ownership
Unauthorized implementation creates operational risk.
3. Testing Validates Effectiveness
Controls must be:
- Tested for design effectiveness
- Evaluated for operating effectiveness
- Reviewed based on risk level
- Remediated when deficiencies are identified
- Reported through governance channels
Unvalidated controls are assumed — not proven.
4. Awareness Reduces Human Risk
Training must:
- Align with threat landscape
- Target high-risk roles
- Measure behavioral effectiveness
- Support policy compliance
- Reinforce risk culture
Completion rate ≠ effectiveness.
5. Third-Party Risk Is Retained Risk
Vendor governance requires:
- Risk-based onboarding
- Contractual safeguards
- Ongoing monitoring
- Fourth-party oversight
- Clear internal ownership
Outsourcing services does not outsource accountability.
6. Communication Enables Governance
Reporting must:
- Align with enterprise risk
- Be audience-specific
- Highlight trends
- Trigger escalation when necessary
- Support executive decisions
Technical noise is not governance reporting.
Section B – Practice Questions
Question 1
A preventive control would eliminate a moderate risk but significantly disrupt critical operations.
What is the MOST appropriate action?
- Implement the control immediately
- Evaluate proportional alternatives aligned with risk appetite
- Eliminate the business process
- Ignore the risk
Answer & Explanation
Correct Answer: B
Controls must balance risk reduction with operational feasibility.
Question 2
A new security tool is deployed without following formal change management.
What is the PRIMARY governance weakness?
- Failure to follow structured implementation process
- Encryption gap
- Vendor inefficiency
- Monitoring delay
Answer & Explanation
Correct Answer: A
Control implementation must follow change governance.
Question 3
Control testing reveals repeated access review failures.
What should occur FIRST?
- Replace the access system
- Increase monitoring frequency
- Ignore minor issues
- Conduct root cause analysis and initiate remediation tracking
Answer & Explanation
Correct Answer: D
Repeated failures indicate systemic control weakness.
Question 4
Security awareness training shows 100% completion but phishing click rates remain high.
What is the MOST appropriate improvement?
- Increase training frequency
- Replace email systems
- Implement targeted, role-based reinforcement and measure behavioral outcomes
- Eliminate training
Answer & Explanation
Correct Answer: C
Effectiveness must be measured beyond completion rates.
Question 5
A critical vendor contract lacks right-to-audit language.
What is the PRIMARY risk?
- Encryption weakness
- Inability to validate vendor control effectiveness
- Monitoring delay
- Vendor reputation risk
Answer & Explanation
Correct Answer: B
Audit rights support ongoing third-party oversight.
Question 6
Security reports focus heavily on vulnerability counts without linking to business impact.
What is the PRIMARY reporting deficiency?
- Lack of enterprise risk context
- Reduced automation
- Vendor inefficiency
- Increased scanning
Answer & Explanation
Correct Answer: A
Governance reporting must reflect enterprise risk posture.
Question 7
A control was implemented successfully but is not monitored for performance.
What is the MOST significant risk?
- Encryption failure
- Vendor delay
- Increased automation
- Inability to validate ongoing effectiveness
Answer & Explanation
Correct Answer: D
Controls must be measurable and monitored.
Question 8
A vendor engages subcontractors to process sensitive data without notifying your organization.
What is the MOST appropriate response?
- Ignore subcontractor activity
- Replace vendor immediately
- Assess fourth-party exposure and enforce contractual safeguards
- Increase internal encryption
Answer & Explanation
Correct Answer: C
Fourth-party risk requires structured oversight.
Question 9
Executive leadership is unaware of rising control failure trends.
What is the PRIMARY governance issue?
- Encryption weakness
- Inadequate program communication and escalation
- Vendor inefficiency
- Reduced automation
Answer & Explanation
Correct Answer: B
Material risk trends must be communicated.
Question 10
Security invests heavily in advanced tools but experiences high staff turnover and weak control testing.
What is the MOST significant underlying issue?
- Imbalance between people, process, and technology
- Encryption gap
- Vendor inefficiency
- Monitoring frequency
Answer & Explanation
Correct Answer: A
Program sustainability requires balanced resource alignment.
Section B Pattern Summary
In Domain 3 Section B:
- Controls must be proportional.
- Implementation must follow governance.
- Testing validates effectiveness.
- Awareness strengthens culture.
- Vendors require lifecycle oversight.
- Reporting drives accountability.
CISM rewards disciplined execution — not technical enthusiasm.