CISA QOTD #3 What should a firm's access-management standards actually be built on?
An IS auditor is reviewing the access-management standards of a regulated firm. Which of the following BEST represents the principles those standards should be built on?
A) The standards should center on authentication strength, primarily strong passwords and multi-factor authentication.
B) The standards should be defined by the access mechanism in use, such as role-based access control implemented across all systems.
C) The standards should be embodied by the privileged access management tooling deployed for administrative accounts.
D) The standards should enforce least privilege, need-to-know, segregation of duties, default-deny, and periodic recertification of access.