A global logistics company is implementing a multi-cloud strategy, using different IaaS providers for different geographic regions to optimize latency. The CISO is concerned about maintaining a consistent security and compliance posture across all environments. As the lead cloud auditor, which of the following is the MOST critical first step in establishing a unified cloud governance framework?
Q2
During an audit of a SaaS provider, an auditor discovers that the provider relies on a third-party data processor for analytics services. The contract between the SaaS provider and the data processor lacks specific clauses regarding data breach notification timelines. This presents a significant risk to the SaaS provider's customers who are subject to GDPR. Which CSA CCM control domain is MOST directly implicated by this finding?
Q3Multiple answers
A financial institution is using a Platform-as-a-Service (PaaS) offering to develop and deploy a new mobile banking application. The cloud auditor needs to verify that the development lifecycle includes adequate security checks. Which of the following activities should the auditor prioritize to gain assurance over the security of the application code itself? (Select TWO)
Q4
True or False: When a cloud customer uses Infrastructure as a Service (IaaS), the responsibility for patching guest operating systems and installed applications lies solely with the Cloud Service Provider (CSP).
Q5
A government agency is required to establish a continuous compliance monitoring program for its sensitive workloads hosted in a community cloud. The program must provide near real-time visibility into the configuration state of all virtual machines and containerized services. The current process involves manual audits performed quarterly. To transition to a continuous model, the lead auditor recommends implementing a system based on the following workflow: ```mermaid sequenceDiagram participant CMDB participant PolicyEngine as Policy Engine (Policy-as-Code) participant CSP_API as Cloud Provider API participant Dashboard as Compliance Dashboard loop Every 15 minutes PolicyEngine->>CSP_API: Query resource configurations CSP_API-->>PolicyEngine: Return current state PolicyEngine->>PolicyEngine: Compare state against defined policies alt Non-Compliant PolicyEngine->>Dashboard: Send Alert PolicyEngine->>CMDB: Update resource status to 'Non-Compliant' else Compliant PolicyEngine->>CMDB: Update resource status to 'Compliant' end end ``` Which of the following is the MOST significant challenge the agency will face when implementing this automated, continuous assurance model?
Q6
**Case Study:** FinSecure, a mid-sized financial technology firm, provides a SaaS platform for wealth management. The platform is built on a single major public cloud provider and handles sensitive Personally Identifiable Information (PII) and financial data, making it subject to GDPR and PCI DSS. The company has grown rapidly, and its initial cloud deployment was managed by a small development team with limited formal security oversight. They now have a dedicated security team and are preparing for their first formal, external audit. The current architecture consists of a three-tier web application running on virtual machines within a single Virtual Private Cloud (VPC). Data is stored in a managed relational database service. All resources were provisioned manually through the cloud console. Logging is enabled, but logs are stored in a decentralized manner within each service's local storage, and there is no centralized Security Information and Event Management (SIEM) system. Identity management relies on basic IAM roles with some users having overly permissive, long-lived credentials. The new Head of Compliance has engaged an external auditor to assess FinSecure's compliance program. The primary goal is to achieve a favorable audit opinion and build a sustainable compliance posture. The auditor notes that while the developers are highly skilled, there is a lack of documented policies, procedures, and evidence of control operation. Given the state of FinSecure's environment, what should be the auditor's primary recommendation to establish a baseline for a successful compliance program?
Q7
An e-commerce company is preparing for its annual PCI DSS assessment for its cloud environment. The assessor has requested evidence that vulnerability scans are being performed on all in-scope systems. The company provides a report from their CSP's native vulnerability management service. However, the report only covers vulnerabilities in the underlying host operating systems of their IaaS instances. What is the MOST likely reason this evidence is insufficient for the auditor?
Q8
When evaluating a Cloud Service Provider's (CSP) submission to the CSA STAR Registry, an auditor notes the provider has a STAR Level 1 Self-Assessment based on the CAIQ. What is the primary limitation an auditor must consider when using this as evidence of the CSP's control environment?
Q9
A cloud auditor is using a threat analysis methodology based on the CSA CCM to evaluate the security of a serverless application. The application uses an API Gateway to trigger a function that processes customer data from a queue and stores the results in an object storage bucket. The auditor identifies a potential threat where an attacker could inject malicious code into the function, causing it to exfiltrate data to an external endpoint. Which CCM control would be MOST effective in mitigating this specific threat?
Q10
When evaluating a cloud compliance program's maturity, an auditor observes that the organization has documented policies and procedures, but their implementation is inconsistent across different teams. Some teams use automated tools for enforcement, while others rely on manual processes. This indicates that the program is largely reactive. According to a standard capability maturity model, which level BEST describes the organization's current state?