ISC2 Governance, Risk and Compliance (CGRC) Practice Question
While drafting the system security plan for an HR payroll system that uses both on-premises servers and a SaaS time-tracking service, what is the correct principle for defining the system's authorization boundary?
Include every component that processes, stores, transmits, or displays payroll data, regardless of ownership or location.
Limit the boundary to organization-owned, on-premises infrastructure; document cloud services separately as external services.
Exclude user workstations that access payroll functions through HTTPS because encryption mitigates risk.
Use the previous accreditation's component list to expedite documentation, updating only hardware changed since the last review.
An authorization boundary must encompass every component that processes, stores, transmits, or displays the system's information, without regard to who owns the asset or where it is located. NIST guidance on system security planning and risk management (e.g., SP 800-18 Rev. 1 and SP 800-37 Rev. 2) states that the boundary is determined by information flow and control, not by organizational ownership, physical placement, or previous accreditation scope. Excluding cloud services, re-using outdated component lists, or omitting user devices solely because they use encrypted connections would leave portions of the information system unmanaged and unprotected, defeating the purpose of boundary definition. Therefore, the comprehensive inclusion of all components that handle payroll data-whether on-premises or in a SaaS environment-is required.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is NIST SP 800-18 Rev. 1 and its relevance to system security planning?
Open an interactive chat with Bash
Why include SaaS components within the authorization boundary?
Open an interactive chat with Bash
How does encryption (e.g., HTTPS) impact authorization boundary definition?
Open an interactive chat with Bash
ISC2 Governance, Risk and Compliance (CGRC)
Scope of the System
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .