5.3 Flashcards
Third-party risk assessment, agreement types
A condition outlined in a contract between an organization and a third-party that says that the organization is allowed to perform a security audit on the third-party.
Right-to-audit clause
A document that defines the purpose and scope of a penetration test.
It includes when the test will happen, what systems are included or exempted from the test, the IP address ranges that will be tested, contact information of people to notify in case something goes awry, how to handle sensitive data, and whether the test occurs internally or externally.
Rules of engagement
Documents that verify the authenticity and thoroughness of an internal security audit. This is produced by a third-party to the organization with which it has an agreement.
These documents might be required for compliance with industry standards.
Evidence of internal audits
The most common way for an organization to verify the security of a third-party
Pentesting
The process of evaluating the security of third-party products, from raw materials to the final deliverable.
Includes communication between the organization and third-party, IT systems, patches, physical security, etc.
Supply chain analysis
The process of bringing in an outside contractor to evaluate the security of your organization and provide recommendations.
This knowledgeable third-party may be able to provide a different perspective and seasoned skills that can benefit the company.
Independent assessment
The process of investigating and getting more information about a company before doing business with them.
Due diligence
When there is something that might compromise the judgement on either side of the business relationship. It may prevent the two companies from doing business with each other.
Ex. A third-party you want to do business with also works with your competitor.
The third-party employs a relative of your organization’s executive.
Conflict of interest
The process of ongoing management and assessment of the vendor relationship that keeps going even after the contract is signed.
Includes regular financial health checks, IT security reviews, news articles, and social media posts.
Vendor monitoring
A simple way to find out more information about how a vendor does business. A method used to carry out due diligence.
The results are used to update a vendor risk analysis. It also allows you to recommend solutions to the vendor for better security.
Includes questions about their due diligence process, their disaster recovery plans, their storage methods, etc.
Questionnaire
SLA stands for
Service-Level Agreement
MOA stands for
Memorandum of Agreement
MOU stands for
Memorandum of Understanding
MSA stands for
Master Service Agreement
WO stands for
Work Order