A company has recently acquired a competitor and needs to integrate their IT staff. During this transition, which of the following is the BEST approach to minimize security risks when transferring employees from the acquired company?
Maintain equivalent access rights from their former company to ensure business continuity
Provide administrator access during the transition period and audit usage afterward
Transfer employees with standard access and schedule permission reviews later
Review access permissions and adjust them according to new roles before granting system access
The correct answer is to review access permissions and adjust them according to new roles before granting system access. This approach follows the principle of least privilege, ensuring employees only have access to the resources necessary for their new roles. By reviewing and adjusting permissions before granting system access, the organization can prevent potential security issues from inappropriate access levels.
The other options present security risks: Maintaining equivalent access rights could result in excessive privileges that aren't needed in the new role. Granting administrator access during transition creates unnecessary security exposure. Scheduling permission reviews after employees have been transferred leaves a vulnerability window where inappropriate access could be exploited. The best practice is to establish appropriate access levels at the time of transfer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the principle of least privilege?
Open an interactive chat with Bash
What are access permissions and why are they important?
Open an interactive chat with Bash
What are the risks associated with maintaining equivalent access rights?
Open an interactive chat with Bash
ISC2 CISSP
Security and Risk Management
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access