CAS-005 governance questions usually test whether a security decision can be defended with ownership, scope, evidence, and approved risk logic. In this domain, the strongest answer rarely stops at a policy name or a tool purchase; it connects requirements to accountable owners, affected assets, third-party dependencies, compliance timing, and monitoring proof. Read each scenario as an audit trail: what is required, who owns it, what system is in scope, what evidence is current, and what exception or residual-risk decision has been approved.
Official Objective Mapping: Governance, risk, and compliance; related CAS-005 objective areas: 1.1 organizational security requirements and governance components; 1.4 change/configuration management; GRC tool mapping, automation, reporting, and compliance tracking.
Plain-English Understanding: This topic tests whether you can prove that a governance requirement is actually owned, implemented, monitored, and auditable. Do not choose a tool only because it sounds familiar. First decide whether the issue is policy authority, ownership, asset scope, evidence freshness, or exception handling.
Key Concepts: policy / standard / procedure separation; RACI accountability; CMDB and asset lifecycle; GRC evidence mapping; continuous monitoring evidence.
Exam Focus: audit-style wording where the real missing piece is not the security control itself, but the traceable chain between requirement, accountable owner, affected asset, evidence date, and exception handling.
Practice Question: A new encryption standard exists, but auditors find that several production databases have no listed control owner and no current exception record. What is the best next action?
A. Create a traceable GRC mapping from the standard to database assets, accountable owners, evidence dates, and exception workflow B. Ask administrators to rename the database configuration files to match the standard C. Disable database access until every screenshot is manually uploaded D. Replace the CMDB with a vulnerability scan report
Correct Answer: A
Explanation: A is the best answer because the audit problem is the missing governance chain: standard, affected databases, accountable owners, evidence dates, and exception handling. Renaming files does not prove enforcement. Disabling access may be disproportionate before scope is validated. A vulnerability scan can reveal findings, but it cannot replace ownership and compliance evidence.
Practice Question: During a board review, security leadership asks why a privileged-access control is marked effective. Which evidence is most defensible?
A. A slide stating that privileged access is important B. A list of all administrators copied from an old ticket C. A vendor brochure for a PAM product D. A dashboard showing mapped privileged-access requirements, accountable owner approval, covered assets, last test result, and open exceptions
Correct Answer: D
Explanation: D is correct because it shows the control's requirement, owner, asset coverage, test result, and exception state in one evidence path. A slide is an assertion. An old admin list may be stale and does not prove control status. A vendor brochure describes capability, not implementation.
Exam Takeaway: If the stem mentions audit gaps, unclear ownership, stale evidence, or inconsistent procedures, choose the option that reconnects requirement, asset, owner, evidence date, and exception state.
What this topic really tests: can you turn a broad governance requirement into an auditable chain of ownership and evidence? Start with the control intent, then attach the requirement to a named owner, scoped assets, implementation evidence, review cadence, and exception path. A policy without RACI ownership is hard to enforce; a CMDB record without control mapping is just inventory; evidence without timestamp and reviewer context does not prove continuous monitoring. The exam often hides the answer in words such as inconsistent evidence, unclear ownership, or audit gap.
Beginner-friendly grounding: Think of governance as the paper trail that proves security is not just promised but actually operated. A control is defensible only when the requirement, owner, affected assets, evidence date, and exception process point to the same story.
Exam transformation: wrong options usually appear as renaming documents instead of proving enforcement; buying a tool before fixing ownership; collecting one-time screenshots instead of continuous evidence; treating a policy as proof that a control works. These options can sound professional, but they solve the wrong layer or skip the state that must be proven. The correct option matches the security property, operational phase, and evidence requirement described by the stem.
| Object | Attribute | Value Range | Default State | Dependency | Failure State |
|---|---|---|---|---|---|
| Security policy | Control intent and scope | Enterprise-wide or business-unit scoped | Approved baseline | Management commitment and standards | Teams implement inconsistent controls without an auditable requirement source |
| RACI matrix | Ownership assignment | Responsible, accountable, consulted, informed | Undefined until program design | Security program management | Gaps appear when reporting, exception approval, or incident escalation has no accountable owner |
| CMDB record | Asset identity and lifecycle state | Owned, deployed, retired, exempt | Unknown or unmanaged | Inventory and change management | Controls cannot be validated because the asset is not tied to owner, criticality, or configuration baseline |
| GRC platform mapping | Framework-to-control relationship | One-to-many or many-to-one mappings | Manual spreadsheet or no mapping | Compliance tracking and documentation | Audit evidence becomes stale and cannot prove continuous monitoring |
Command and evidence confidence: Use vendor-supported consoles, management APIs, SIEM/EDR views, GRC workflow evidence, repository settings, cloud audit views, or version-aware CLI verification for the deployed platform. Treat generic shell snippets, sample queries, and tabletop rehearsals as lab rehearsal unless they are validated against the organization's active tool version.
The chain begins with a governance requirement such as privileged access, encryption, or asset ownership. That requirement becomes enforceable only when a policy or standard defines the expectation, a RACI entry assigns accountability, a CMDB or inventory record defines scope, and a GRC workflow tracks evidence. If any link is missing, the organization may have documents but cannot prove control effectiveness. That is why the correct answer usually restores traceability before buying tools or collecting ad hoc artifacts.
A strong exam answer follows this chain without skipping layers. First identify the event or requirement, then the object that controls it, then the dependency that must be valid, then the evidence source that proves the state. If the option jumps straight to remediation while the controlling dependency is unknown, it is usually a distractor.
| Task | Precise Command or Path | Verification Standard |
|---|---|---|
| Validate policy-to-control mapping | GRC tool: control library > requirement mapping > evidence tab | Each mandatory requirement has a mapped control, evidence owner, status, and review date |
| Confirm accountable ownership | Program documentation path: security program > RACI matrix > privileged access standard | One accountable owner and clear responsible teams are assigned for implementation and reporting |
| Inspect asset coverage | CMDB or inventory query: filter by control scope and privileged-access dependency | Assets in scope have owner, criticality, lifecycle state, and exception flag |
| Review monitoring status | Compliance dashboard: control status > overdue evidence > exception queue | No critical assets rely on expired evidence or undocumented exception approval |
Official Objective Mapping: Governance, risk, and compliance; related CAS-005 objective areas: risk management strategies, third-party risk, compliance obligations, business continuity, disaster recovery, backup, and breach response decision logic.
Plain-English Understanding: This topic tests whether you can prioritize risk treatment when business impact, vendor dependency, legal obligation, and recovery capability collide. The safest exam answer usually validates impact, obligations, restore evidence, and residual risk before choosing a treatment.
Key Concepts: risk appetite; residual risk; third-party due diligence; contractual notification; RPO / RTO; backup isolation and restore testing.
Exam Focus: decide whether the scenario is about business impact, vendor obligation, recovery evidence, or formal risk acceptance before selecting mitigation.
Practice Question: A vendor outage affects a regulated customer portal. The contract has a 24-hour notification clause and the last restore test missed the RTO. What is the first risk-management action?
A. Wait for the vendor to finish its public postmortem before documenting risk B. Delete the vendor from the risk register C. Validate business impact, notification obligations, current recovery capability, and residual risk against approved appetite D. Reclassify the outage as low risk because it is external
Correct Answer: C
Explanation: C is correct because the decision cannot be made from outage status alone. The organization must know customer impact, contractual notification timing, recovery evidence, and whether residual risk exceeds appetite. Waiting or deleting records weakens governance, and calling the issue low risk ignores inherited operational and compliance exposure.
Practice Question: A team proposes accepting a high-impact risk because remediation is expensive. What evidence must exist before acceptance is defensible?
A. A screenshot of the vulnerability scanner home page B. A verbal statement from the application owner C. A list of unrelated patched servers D. Documented residual risk, business impact, compensating controls, owner approval, and alignment with risk appetite
Correct Answer: D
Explanation: D is correct because risk acceptance is a governance decision, not a casual technical preference. The record must show what risk remains, why it is tolerable, which controls reduce exposure, and who is authorized to accept it. The other options are incomplete evidence fragments.
Exam Takeaway: When vendor exposure, restore failure, or legal timing appears in the same scenario, validate impact and obligations before accepting, transferring, or remediating risk.
What this topic really tests: can you choose a risk action that matches business consequence rather than technical noise? A third-party event is still your risk when it affects your data, customers, operations, or contracts. A backup is not a resilience control until restore evidence proves RPO and RTO. A risk score is not complete until it includes likelihood, impact, exposure, compensating controls, residual risk, and an accountable decision maker.
Beginner-friendly grounding: Risk questions are not asking which problem sounds scariest. They ask which loss scenario matters most to the business, which vendor or recovery dependency changes impact, and whether the remaining risk has been approved by the right owner.
Exam transformation: wrong options usually appear as accepting vendor risk because the vendor caused the event; patching a visible issue before checking business impact; assuming backups are useful without restore evidence; using vulnerability severity as the only risk score. These options can sound professional, but they solve the wrong layer or skip the state that must be proven. The correct option matches the security property, operational phase, and evidence requirement described by the stem.
| Object | Attribute | Value Range | Default State | Dependency | Failure State |
|---|---|---|---|---|---|
| Risk register entry | Impact and likelihood scoring | Qualitative, quantitative, or hybrid | Unranked finding | Risk assessment framework | Teams remediate visible issues while higher-impact dependencies remain untreated |
| Risk appetite statement | Acceptable residual risk boundary | Low, moderate, high, or numeric threshold | Not formally approved | Executive governance | A technical fix is selected without business tolerance alignment |
| Third-party dependency | Supply chain or subprocessor exposure | Critical, important, low-impact | Unclassified vendor | Contractual obligations and due diligence | Incident scope misses inherited processing or service continuity risk |
| Backup set | Recoverability and isolation | Connected, disconnected, immutable, tested | Connected and untested | BC/DR testing | Ransomware or deletion propagates into recovery media |
Command and evidence confidence: Use vendor-supported consoles, management APIs, SIEM/EDR views, GRC workflow evidence, repository settings, cloud audit views, or version-aware CLI verification for the deployed platform. Treat generic shell snippets, sample queries, and tabletop rehearsals as lab rehearsal unless they are validated against the organization's active tool version.
The chain starts with an event or finding, then moves through business impact analysis, third-party obligation review, recovery evidence, risk scoring, treatment selection, and approval. If restore tests fail, availability risk remains high even when backup jobs succeeded. If contract clauses require notification, legal timing becomes part of the security response. The correct exam answer keeps these dependencies together instead of treating vendor, backup, and compliance as separate problems.
A strong exam answer follows this chain without skipping layers. First identify the event or requirement, then the object that controls it, then the dependency that must be valid, then the evidence source that proves the state. If the option jumps straight to remediation while the controlling dependency is unknown, it is usually a distractor.
| Task | Precise Command or Path | Verification Standard |
|---|---|---|
| Validate risk priority | Risk register: affected process > impact score > residual risk field | Risk score reflects business impact, likelihood, and approved appetite |
| Inspect vendor obligations | Third-party risk portal: vendor profile > contract clauses > breach notification | Notification, subprocessor, and audit evidence requirements are visible and current |
| Confirm recovery evidence | BC/DR repository: restore test report > RPO/RTO result > backup isolation state | Restore test meets target or has documented remediation and retest owner |
| Check treatment closure | Risk workflow: remediation item > validation evidence > owner approval | Residual risk is accepted, mitigated, transferred, or avoided with approval |
Official Objective Mapping: Governance, risk, and compliance; related CAS-005 objective areas: threat modeling methodologies, AI risk management, data-flow analysis, trust boundaries, misuse cases, and security requirements for emerging technology adoption.
Plain-English Understanding: This topic tests whether you can model what an AI-enabled system is allowed to see, decide, and do. The main question is not whether AI is risky in general; it is where data crosses a boundary, which identity can invoke tools, and what guardrail proves the assistant cannot exceed its authority.
Key Concepts: data-flow diagram; trust boundary; STRIDE; MITRE ATT&CK / CAPEC; prompt injection; plugin/tool permission; AI data leakage.
Exam Focus: permission boundaries, tool invocation, DLP, audit logging, and misuse-case modeling.
Practice Question: An AI assistant can summarize HR records and create help-desk tickets. A test prompt asks it to reveal salary data while opening a privileged workflow. Which control set should be validated first?
A. Data-flow trust boundaries, DLP policy, assistant identity permissions, tool approval gates, and audit logs B. Only the model temperature setting C. Password age for all HR employees D. Whether the assistant has a friendly name
Correct Answer: A
Explanation: A is correct because the scenario combines sensitive-data retrieval and privileged tool action. The defensible response validates the assistant's data boundary, identity permissions, DLP behavior, approval workflow, and audit trail. Temperature, passwords, and display names do not enforce what the assistant may see or do.
Practice Question: A team says prompt injection is solved because the system prompt tells the model to ignore malicious instructions. What is the best response?
A. Accept the claim because system prompts are always authoritative B. Validate least-privilege tool permissions, output filtering, approval workflow, logging, and data access boundaries C. Disable all audit logs D. Give the assistant administrator rights so it can recover from attacks
Correct Answer: B
Explanation: B is correct because prompt instructions can guide behavior but cannot replace enforcement. Least privilege, filtering, approval gates, logging, and data boundaries continue to work even when the model receives hostile input. The other choices either overtrust the prompt or increase blast radius.
Exam Takeaway: For AI scenarios, do not trust prompt wording as a security boundary; choose controls that constrain data access, tool invocation, approval workflow, and audit evidence.
What this topic really tests: can you convert an AI feature into a normal security architecture problem with identities, data flows, trust boundaries, permissions, and evidence? Prompt injection matters because the model may be connected to tools, plugins, records, or workflow actions. The control must live where the action is enforced: IAM, DLP, approval workflow, sandbox, content filter, logging, or data boundary. The exam distractor often sounds AI-specific but does not control the underlying permission path.
Beginner-friendly grounding: Think of the AI assistant as a privileged application, not just a chatbot. The risk comes from what it can retrieve, what it can trigger, which identity it uses, and what logs prove blocked misuse.
Exam transformation: wrong options usually appear as treating an AI assistant as only a chatbot UI; using model wording instead of permission boundaries; turning off logs to prevent leakage; ignoring plugin and tool invocation. These options can sound professional, but they solve the wrong layer or skip the state that must be proven. The correct option matches the security property, operational phase, and evidence requirement described by the stem.
| Object | Attribute | Value Range | Default State | Dependency | Failure State |
|---|---|---|---|---|---|
| Data-flow diagram | Trust boundary crossing | Internal, external, third-party, model-facing | Undocumented flow | Architecture review | Controls are placed at components while data crosses unvalidated boundaries |
| Threat model | Framework selection | STRIDE, ATT&CK, CAPEC, OWASP, attack trees | Ad hoc brainstorming | Actor and attack-pattern analysis | Important threats are missed because the model does not match the system type |
| AI assistant identity | Permission boundary | Read-only, delegated, privileged, autonomous | Shared broad service account | IAM and DLP guardrails | Prompt injection or excessive agency causes unauthorized action or data disclosure |
| Model supply chain | Training, plugin, or dependency integrity | Verified, unverified, poisoned, vulnerable | Unreviewed package or plugin | AI governance and software assurance | Model output or tool execution is trusted without provenance or containment |
Command and evidence confidence: Use vendor-supported consoles, management APIs, SIEM/EDR views, GRC workflow evidence, repository settings, cloud audit views, or version-aware CLI verification for the deployed platform. Treat generic shell snippets, sample queries, and tabletop rehearsals as lab rehearsal unless they are validated against the organization's active tool version.
The chain starts when user input enters an AI application. The prompt is combined with context, retrieved data, tool descriptions, and assistant identity permissions. If a malicious instruction causes the assistant to request restricted data or invoke a tool, enforcement depends on DLP, IAM, plugin approval, sandboxing, and audit logging. A secure design blocks or records the unauthorized path at the boundary; an insecure design trusts the generated text as if it were a policy decision.
A strong exam answer follows this chain without skipping layers. First identify the event or requirement, then the object that controls it, then the dependency that must be valid, then the evidence source that proves the state. If the option jumps straight to remediation while the controlling dependency is unknown, it is usually a distractor.
| Task | Precise Command or Path | Verification Standard |
|---|---|---|
| Inspect trust boundaries | Architecture review artifact: DFD > boundary annotations > control mapping | Every external, model, and plugin boundary has an authentication, authorization, validation, and logging control |
| Validate assistant permissions | IAM portal or policy viewer: assistant identity > effective permissions | The assistant has least privilege and no broad write actions without approval workflow |
| Review DLP guardrails | DLP console: AI app policy > sensitive data rule > enforcement mode | Sensitive records are blocked, redacted, or require justified access according to policy |
| Rehearse prompt-injection handling | Local lab rehearsal: submit malicious instruction through test tenant and review audit events | The assistant refuses unauthorized tool use and logs the blocked attempt |
What should a security leader do when an audit finds that a required control exists in policy but has no accountable owner or current evidence?
Create or update the GRC mapping so the control is tied to scoped assets, accountable owners, evidence dates, review cadence, and an exception workflow.
CAS-005 governance questions usually test whether the organization can prove control effectiveness, not just whether a policy exists. A defensible control record must connect the requirement to ownership, affected systems, current evidence, and approved exception handling. Without that chain, the control cannot be reliably audited or escalated.
Demand Score: 92
Exam Relevance Score: 97
How should a team handle a request to accept a high-impact security risk because remediation is expensive?
Document the residual risk, business impact, compensating controls, risk appetite alignment, review date, and approval from the authorized risk owner.
Risk acceptance is a formal governance decision. It is not enough for a system owner to verbally state that remediation is too costly. The organization must show what exposure remains, why it is tolerable, which controls reduce impact or likelihood, and who has authority to accept the risk.
Demand Score: 90
Exam Relevance Score: 96
What should be reviewed first when a third-party outage affects a regulated customer-facing service?
Review customer impact, contractual notification requirements, data exposure, recovery capability, vendor obligations, and residual risk.
A third-party incident can still create direct organizational risk. The company may remain responsible for regulatory reporting, customer communication, service continuity, and data protection even when the initial failure happens at a vendor. CAS-005 expects third-party risk decisions to include business, legal, and technical impact.
Demand Score: 88
Exam Relevance Score: 95
Why is restore testing stronger evidence than a written backup policy during a resilience review?
Restore testing proves whether backups can meet recovery point and recovery time objectives, while a policy only states the intended process.
Business continuity and disaster recovery require operational proof. A backup may exist but still fail to restore, restore too slowly, or lose more data than the business can tolerate. CAS-005 scenarios often reward evidence that validates actual recoverability instead of documentation alone.
Demand Score: 86
Exam Relevance Score: 94
What should be evaluated before approving enterprise use of an AI system that processes sensitive internal data?
Evaluate data classification, data flows, trust boundaries, model access, prompt handling, output handling, retention, logging, misuse cases, and accountable risk ownership.
AI adoption risk includes privacy, leakage, misuse, explainability, and monitoring concerns. The strongest governance response identifies where sensitive data enters the system, how it is transformed, who can access the output, and what controls detect misuse or unauthorized disclosure.
Demand Score: 84
Exam Relevance Score: 92
When policy, standards, and procedures conflict, what is the best governance response?
Align the documents under the approved policy authority, clarify mandatory requirements, assign owners, and update implementation procedures and evidence mapping.
Governance artifacts serve different roles. Policies define intent, standards define mandatory requirements, and procedures define repeatable execution. If they conflict, teams may implement inconsistent controls and auditors cannot determine which requirement is authoritative.
Demand Score: 82
Exam Relevance Score: 91