Third Party Connection Security Policy Quiz

TerrificAntigorite avatar
TerrificAntigorite
·
·
Download

Start Quiz

Study Flashcards

5 Questions

What must the Right-Hand do before implementing a connection with a Third Party?

Conduct a risk assessment

What must the Third Party and Right-Hand inform each other about?

Security incidents which may impact the confidentiality, integrity or availability of the third-party service or data

What must the Right-Hand be responsible for?

Liaising with the Third Party

What must the Third Party meet in order to be connected with the Right-Hand?

Security standards

What type of incidents should the Right-Hand be aware of?

Computers left unlocked when unattended

Study Notes

  • The Right-Hand takes precedence over any individual requirements for a Third Party connection.
  • A risk assessment should be conducted, prior to implementation of any connection, to identify specific requirements.
  • The Third Party must meet the Right-Hand’s security standards and comply with Right-Hand’s security policies.
  • The Right-Hand must be able to monitor and access the Third Party’s information and data.
  • The Right-Hand must be responsible for liaising with the Third Party and ensuring all relevant bodies are informed when the connection is no longer required.
  • Third Parties and the Right-Hand must inform each other about any security incidents which may impact the confidentiality, integrity or availability of the third-party service or data provided by the service.
  • Incidents originating within the Right-Hand must be handled in accordance with the ‘Security incident management policy and procedures.’
  • The range of security incidents which will require security awareness procedures includes: Computers left unlocked when unattended, password disclosures, virus warnings/alerts, media loss, data loss/disclosure, misuse/loss/corruption/alteration of Personal information, physical security breaches, and missing correspondence.

Test your knowledge of the security requirements and responsibilities for establishing and maintaining connections with third-party entities. This quiz covers risk assessment, security standards, incident reporting, and handling security incidents.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Security Policy Development Quiz
3 questions
Security Policy Components Quiz
62 questions
Ley de Uso de la Fuerza por Parte del Estado
20 questions
Use Quizgecko on...
Browser
Browser