Podcast
Questions and Answers
Why is it important to have security measures in place for third-party access to your systems?
Why is it important to have security measures in place for third-party access to your systems?
What is a common reason for system integrators to have additional access to systems?
What is a common reason for system integrators to have additional access to systems?
What is a possible way a third party may have access to your data?
What is a possible way a third party may have access to your data?
What should you plan for when it comes to third-party access to your systems?
What should you plan for when it comes to third-party access to your systems?
Signup and view all the answers
Why is it necessary to have security policies and procedures in place for third-party access?
Why is it necessary to have security policies and procedures in place for third-party access?
Signup and view all the answers
What type of security is important to consider when it comes to third-party access?
What type of security is important to consider when it comes to third-party access?
Signup and view all the answers
Where should production services be located?
Where should production services be located?
Signup and view all the answers
What should be done after the code is completed?
What should be done after the code is completed?
Signup and view all the answers
Why is encryption important when storing data in a third-party location?
Why is encryption important when storing data in a third-party location?
Signup and view all the answers
What type of data may require special consideration when storing in a third-party location?
What type of data may require special consideration when storing in a third-party location?
Signup and view all the answers
How should data be transferred in and out of a third-party location?
How should data be transferred in and out of a third-party location?
Signup and view all the answers
What is a benefit of storing data in an encrypted form?
What is a benefit of storing data in an encrypted form?
Signup and view all the answers
What is a major concern with integrators being inside the network?
What is a major concern with integrators being inside the network?
Signup and view all the answers
What is an example of a security issue that was identified with a vendor?
What is an example of a security issue that was identified with a vendor?
Signup and view all the answers
What is the importance of partnering with vendors?
What is the importance of partnering with vendors?
Signup and view all the answers
What is a potential security issue in the supply chain?
What is a potential security issue in the supply chain?
Signup and view all the answers
What is a rare but possible security issue?
What is a rare but possible security issue?
Signup and view all the answers
What is an example of a security issue with hardware from a third party?
What is an example of a security issue with hardware from a third party?
Signup and view all the answers
Why is it important to have processes and procedures in place for the supply chain?
Why is it important to have processes and procedures in place for the supply chain?
Signup and view all the answers
What is a concern when having programming services done by a third party?
What is a concern when having programming services done by a third party?
Signup and view all the answers
What is a consideration when deciding where to store code?
What is a consideration when deciding where to store code?
Signup and view all the answers
Why is it important to ensure vendors are aware of security problems?
Why is it important to ensure vendors are aware of security problems?
Signup and view all the answers