During the transition/deployment phase of the information system lifecycle, parallel operation (running both the old and new systems simultaneously) is considered a security risk that should be avoided whenever possible.
The statement is false. Parallel operation is actually a common and often recommended strategy during the transition/deployment phase of the information system lifecycle. Running both the old and new systems simultaneously provides several security benefits:
It allows for validation that the new system is functioning properly before completely decommissioning the old system
It helps identify security gaps or vulnerabilities in the new system that might not have been caught during testing
It provides a fallback mechanism if critical security issues are discovered in the new system
It enables proper data migration verification without risking data loss or integrity issues
While parallel operations do introduce some complexity and temporary additional resource usage, the security benefits generally outweigh these concerns. Proper security controls should be implemented during this parallel phase, but avoiding it altogether would typically increase rather than decrease security risk.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some potential security risks associated with transitioning to a new system?
Open an interactive chat with Bash
What does 'data migration verification' involve?
Open an interactive chat with Bash
What security controls should be in place during parallel operation?
Open an interactive chat with Bash
ISC2 CISSP
Security Architecture and Engineering
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Oh snap!
Loading...
Loading...
Loading...
Information Technology Package Join Premium for Full Access