Scenario: During risk identification, a team member suggests a potential security vulnerability in the application. What should be the next step?

  • Conduct a comprehensive security audit to confirm the vulnerability
  • Document the potential vulnerability in the risk register and escalate it to the relevant stakeholders
  • Ignore the suggestion as it might be a false alarm
  • Immediately report the vulnerability to the development team and halt testing activities
The next step should be to document the potential security vulnerability in the risk register and escalate it to the relevant stakeholders. This ensures that the identified risk is formally acknowledged, and appropriate actions can be taken. Ignoring the suggestion might lead to security breaches, while conducting a security audit might cause unnecessary delays. Effective risk management involves proper documentation and communication to address potential threats.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *