Pre-Contract: Connectivity Flashcards
Connectivity
Connectivity adds more risk
-open hole in your network. We need to be aware of what they are, even if we don’t have control over who they are.
-Your ability to do due diligence can get complicated.
Relationships are complicated
Types of Connectivity
-Leased-line (from ISDN to P2P to MPLS and on): usually requires a piece of hardware (now sometimes software-only routers) at each end and sometimes in between to route traffic.
Follow-Up: What is the patch management process for
this hardware?
-File Drops: From Box to SFTP to Email
-Web: HTTP or HTTPS
-Screen-Scrapers
-Intermittent Connectivity (hard drive transfers, USB drives, etc.)
-Encryption
-Access Management
-Out-of-Band Devices
*E.g. Business owners will say they don’t have a connection to use but they have data so how are they getting the data? They’re connected.
Types of Connectivity
-Leased-Line
-File-Drops
-Web
-Screen-Scrapers
-Intermittent
Types of Connectivity:
Leased-Line
(from ISDN to P2P to MPLS and on): usually requires a piece of
hardware (now sometimes software-only routers) at each end and sometimes in between to route traffic.
Follow-Up: What is the patch management process for this hardware?
Leased line is always on.
Types of Connectivity:
File Drops
From Box to SFTP to Email
Types of Connectivity:
Web
HTTP or HTTPS
Types of Connectivity:
Screen-Scrapers
Go to your site and take data off of them
Types of Connectivity:
Intermittent
-Hard drive transfers
-USB drives
-Intermitted connectivity once a month
-Most challenging because they’re not always on. You won’t always get a vendor that is open about how often they need to connect.
Connectivity:
Access Management
Who has access to the devices and how do they get into those?
Connectivity:
Out-of-Band Devices
Most common way we see them is hardware device such as a network router that gives your company access to the internet.
-If the service is off, this gives your vendor the ability to remove access to the machine to get the access back.
-You should have a process that asks for business justification for it, what is the timeline you need it back.
-Generally are not connected to monitoring activity, they are a backdoor. Search out of band device controls.