Podcast
Questions and Answers
Why is it important to have security measures in place for third-party access to your systems?
Why is it important to have security measures in place for third-party access to your systems?
- Because third parties are never trustworthy
- Because third parties are only contractually obligated to follow security protocols
- Because third parties have access to your systems, but not your data
- Because third parties can make errors, and you should plan for the worst-case scenario (correct)
What is a common reason for system integrators to have additional access to systems?
What is a common reason for system integrators to have additional access to systems?
- To perform their job functions (correct)
- To access sensitive data
- To install malware
- To test system security
What is a possible way a third party may have access to your data?
What is a possible way a third party may have access to your data?
- Only through physical access
- Only through virtual access
- Neither virtual nor physical access
- Through both virtual and physical access (correct)
What should you plan for when it comes to third-party access to your systems?
What should you plan for when it comes to third-party access to your systems?
Why is it necessary to have security policies and procedures in place for third-party access?
Why is it necessary to have security policies and procedures in place for third-party access?
What type of security is important to consider when it comes to third-party access?
What type of security is important to consider when it comes to third-party access?
Where should production services be located?
Where should production services be located?
What should be done after the code is completed?
What should be done after the code is completed?
Why is encryption important when storing data in a third-party location?
Why is encryption important when storing data in a third-party location?
What type of data may require special consideration when storing in a third-party location?
What type of data may require special consideration when storing in a third-party location?
How should data be transferred in and out of a third-party location?
How should data be transferred in and out of a third-party location?
What is a benefit of storing data in an encrypted form?
What is a benefit of storing data in an encrypted form?
What is a major concern with integrators being inside the network?
What is a major concern with integrators being inside the network?
What is an example of a security issue that was identified with a vendor?
What is an example of a security issue that was identified with a vendor?
What is the importance of partnering with vendors?
What is the importance of partnering with vendors?
What is a potential security issue in the supply chain?
What is a potential security issue in the supply chain?
What is a rare but possible security issue?
What is a rare but possible security issue?
What is an example of a security issue with hardware from a third party?
What is an example of a security issue with hardware from a third party?
Why is it important to have processes and procedures in place for the supply chain?
Why is it important to have processes and procedures in place for the supply chain?
What is a concern when having programming services done by a third party?
What is a concern when having programming services done by a third party?
What is a consideration when deciding where to store code?
What is a consideration when deciding where to store code?
Why is it important to ensure vendors are aware of security problems?
Why is it important to ensure vendors are aware of security problems?