Comprehensive and Detailed Explanation:
The CGEIT Review Manual 8th Edition, in its Risk Optimization domain, addresses the need for proactive detection and response to security incidents to minimize risks. The undetected breach attempt highlights a gap in real-time monitoring and alerting.
Option D: The implementation of an intrusion detection and reporting process is the most important. An intrusion detection system (IDS) monitors network and system activities for unauthorized access, generating alerts for immediate response. This would have ensured the breach attempt was detected and reported in real-time, preventing potential data loss. The manual likely references COBIT 2019’s DSS05-Managed Security Services, which emphasizes intrusion detection as a critical security control.
Option A: Periodic analyses of logs and databases is reactive and may not detect breaches in time, unlike real-time IDS.
Option B: A review of security and risk frameworks is broad and long-term, not addressing the immediate detection gap.
Option C: A comprehensive data management policy focuses on data governance, not real-time breach detection.
Double Verification: The answer aligns with COBIT’s DSS05 and the CGEIT domain’s focus on security incident detection. Intrusion detection is a standard ISACA recommendation for preventing undetected breaches.
ISACA CGEIT Review Manual 8th Edition, Domain 4: Risk Optimization (focus on security incident detection).
COBIT 2019, DSS05-Managed Security Services.
ISACA Glossary (for definitions of intrusion detection), available at https://www.isaca.org/resources/glossary.