40 Questions Vendor Security Assessment
40 Questions Vendor Security Assessment
40 Questions Vendor Security Assessment
com
http://www.bitsighttech.com
Getting Started
1
2
3
http://www.bitsighttech.com
This could be any number of people within the organization, but its
important to have contact points for your vendors.
You want to verify that the vendor has someonewhether its a director,
vice president, or CISOin a leadership position responsible for overseeing
security strategy.
Is there a cross-organizational committee that meets regularly on
cybersecurity issues?
Organizations that involve multiple perspectives are likely to have a more
sophisticated approach to managing cyber risk.
http://www.bitsighttech.com
6
7
10
http://www.bitsighttech.com
11
12
13
14
http://www.bitsighttech.com
15
16
17
18
How do you assess the security of the software that you develop
and acquire?
Having a mature application security program is a way of reducing the
threat landscape inside an organization.
http://www.bitsighttech.com
19
20
21
22
23
Describe the processes and tools you use to reduce and control
administrative privileges.
Not everyone needs administrative access; reducing privileges is an
essential element toward creating a more secure ecosystem.
24
http://www.bitsighttech.com
25
26
27
28
How do you plan for and train for a cybersecurity incident? What
processes do you have in place to respond to an incident? Do you
regularly practice those things?
This multipart question should provide you with better insight into
what may happen in your vendors organization should there be any
security issues or concerns.
29
http://www.bitsighttech.com
30
31
32
33
34
35
http://www.bitsighttech.com
10
36
Have you identified any third parties who have access to your
network or data? How do you oversee their security initiatives?
Essentially youre asking your vendor if they have a VRM program in
place, which is important.
37
38
39
40
http://www.bitsighttech.com
11
http://www.bitsighttech.com
12
Aside from risk assessments and questionnaires, there are plenty of steps your
organization can take to build out a strong and comprehensive vendor risk
management program. This includes on-site interviews, technical scans and
penetration tests, and a review of the vendors security documentation. All of these
steps are incredibly importantbut they only offer a snapshot in time of your
vendors health.
Sadly, there are organizations being breached at this very moment. And many of
these companies wont even realize theres an issue until mounds of data have
been compromised. You cant possibly assess whether or not your vendors
security is in order unless you have access to their network in real time. But if you
use a continuous monitoring solution like BitSight, you can take action against real
threats immediately.
Want to see BitSight in action with a free demo?
Its easy. Click here to get started.
13