Podcast
Questions and Answers
What type of vendors may a company work with?
What type of vendors may a company work with?
- Only internal vendors
- Payroll, email marketing, travel, or raw materials vendors (correct)
- Only social media vendors
- Only technology vendors
Why is it important to understand the risk associated with providing data to a third party?
Why is it important to understand the risk associated with providing data to a third party?
- To reduce costs
- To ensure security and protect against breaches (correct)
- To improve customer service
- To increase marketing efforts
What is a recommended practice when working with third-party vendors?
What is a recommended practice when working with third-party vendors?
- Only sharing data via email
- Only working with vendors that have no security requirements
- Categorizing the risk associated with each vendor and having security policies in place (correct)
- Not sharing data with them
What can be a useful practice when contracting with a third-party vendor?
What can be a useful practice when contracting with a third-party vendor?
What happened to Target in 2013?
What happened to Target in 2013?
What is a common scenario when working with cloud services?
What is a common scenario when working with cloud services?
What was the primary source of the malware infection that affected Target's network?
What was the primary source of the malware infection that affected Target's network?
What was the main consequence of the malware infection on Target's network?
What was the main consequence of the malware infection on Target's network?
What is the primary concern related to third-party vendors in the supply chain?
What is the primary concern related to third-party vendors in the supply chain?
What is the benefit of performing an assessment of the supply chain?
What is the benefit of performing an assessment of the supply chain?
What was the result of the software update provided by SolarWinds in 2020?
What was the result of the software update provided by SolarWinds in 2020?
How many companies were infected as a result of the SolarWinds breach?
How many companies were infected as a result of the SolarWinds breach?
What is the primary concern when working with a business partner that has a direct network connection?
What is the primary concern when working with a business partner that has a direct network connection?
What is the recommended way to transfer data between business partners?
What is the recommended way to transfer data between business partners?
What is the purpose of having policies in place for handling risks with business partners?
What is the purpose of having policies in place for handling risks with business partners?
What is the benefit of understanding how intellectual property should be handled between business partners?
What is the benefit of understanding how intellectual property should be handled between business partners?
What is the purpose of a service level agreement (SLA)?
What is the purpose of a service level agreement (SLA)?
What is the purpose of a Memorandum Of Understanding (MOU)?
What is the purpose of a Memorandum Of Understanding (MOU)?
What is the purpose of a Measurement System Analysis (MSA)?
What is the purpose of a Measurement System Analysis (MSA)?
What is the purpose of a Business Partnership Agreement (BPA)?
What is the purpose of a Business Partnership Agreement (BPA)?
What is the purpose of a nondisclosure agreement (NDA)?
What is the purpose of a nondisclosure agreement (NDA)?
What is the difference between a unilateral and a bilateral nondisclosure agreement?
What is the difference between a unilateral and a bilateral nondisclosure agreement?
What happens when a manufacturer announces the end of life (EOL) for a product?
What happens when a manufacturer announces the end of life (EOL) for a product?
What is the difference between the end of life (EOL) and end of service life (EOSL) for a product?
What is the difference between the end of life (EOL) and end of service life (EOSL) for a product?
Why is it important to understand the end of life (EOL) for a product?
Why is it important to understand the end of life (EOL) for a product?
What is the purpose of including a firewall or filter between two networks?
What is the purpose of including a firewall or filter between two networks?
Flashcards are hidden until you start studying
Study Notes
Third-Party Vendors and Security Concerns
- When working with third-party vendors, data sharing is inevitable, and it's essential to understand the risk associated with providing data to a third party.
- Categorize the risk for each vendor and have security policies and procedures in place to protect against the highest-risk vendors.
- Include security requirements in the initial contract to ensure everyone understands the requirements.
Third-Party Vendor Risks: Target Corporation Example
- In 2013, Target Corporation suffered a massive breach due to a third-party HVAC vendor's lack of security measures.
- The vendor's malware-infected email attachment led to the infection of Target's point-of-sale terminals, resulting in the theft of over 110 million credit card numbers.
- This incident highlights the importance of evaluating the security measures of third-party vendors.
Supply Chain Security Concerns
- The supply chain involves multiple organizations, people, and resources, making it challenging to understand the security methods in place.
- Assess the supply chain to identify security risks and improve the process.
- Evaluate the IT systems supporting the supply chain and document changes as needed.
Supply Chain Breach Example: SolarWinds
- In 2020, a software update from a network management provider installed malware onto customers' systems, affecting at least 18,000 companies.
- The malware was digitally signed with the provider's certificate, making it trusted by customers.
- This breach emphasizes the importance of evaluating the security measures in the supply chain.
Business Partners and Security Concerns
- When working with business partners, there may be direct network connections between organizations, creating significant security concerns.
- Implement policies to handle risks, such as building an IPsec connection and monitoring for malicious activity.
- Configure firewalls or filters to manage traffic between networks.
Agreements with Third-Parties
- Service Level Agreements (SLAs) set minimum service terms for specific services or products.
- Memorandums of Understanding (MOUs) outline expectations and requirements between organizations.
- Measurement System Analysis (MSA) evaluates and assesses the quality of measurement systems.
- Business Partnership Agreements (BPAs) detail ownership stakes, financial agreements, and decision-making processes.
- Nondisclosure Agreements (NDAs) ensure confidentiality between parties sharing sensitive information.
End of Life and End of Service Life
- Understand when a product's end of life and end of service life might be, as manufacturers may stop selling and supporting products.
- Plan for security patches and updates when a product reaches its end of life and end of service life.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.