Correct Answer: C
Comprehensive and Detailed In-Depth
A vulnerability in information security refers to a weakness in a system, process, or software that can be exploited, leading to security incidents. In this case, the most significant vulnerability in Northstorm's system was the installation of an illegitimate (compromised) version of the application, which directly impacted the main server and resulted in system downtime.
A . The new version of the application directly affecting the main server is an outcome rather than the vulnerability itself. The reason it affected the server was due to its compromised nature.
B . The need for a replacement version of the application is not a vulnerability but rather a necessity due to the incompatibility issue introduced by the OS upgrade.
C . The new version of the application being illegitimate is the true vulnerability because it represents an unauthorized or unverified change that introduced malicious code or other security risks. This could have been mitigated by proper validation, secure software development practices, and adherence to change management policies outlined in ISO/IEC 27001:2022 Annex A controls:
A .8.8 Management of Technical Vulnerabilities - Ensures that systems and applications are updated and maintained securely.
A .8.9 Configuration Management - Covers proper software deployment and validation procedures.
A .8.14 Redundancy of Information Processing Facilities - Ensures resilience to failures like server downtimes.