ISC2 CISSP Practice Question
A security assessment of a critical manufacturing system identified several high-risk vulnerabilities that cannot be patched due to operational constraints. When documenting these findings in the final report, what is the BEST approach to handling these exceptions?
Recommend scheduling a system shutdown once patches can be applied
Document the vulnerabilities with compensating controls and a risk acceptance timeframe
Mark the vulnerabilities as false positives to clear them from the report
Document the vulnerabilities and outline interim measures since they are not fixed currently