Pre-Contract: Types of Evidence to Collect Flashcards

1
Q

Types of Evidence to Collect

A

-Penetration Test Results
-Independent attestation – Includes SOC 2 and Type II reports.
-Policies and procedures
-Proof of key controls to evidence effectiveness
-Vulnerability report/evidence of patching
-Continuous monitoring report
-Financials
-DR/BC plans and testing
-Employee counts – Includes key person dependency and any significant changes that have occurred.
-Network diagram – Includes cloud architecture and a data flow diagram.
-Background checks – Includes policies and samples of actual background checks.
-Employee access review
-Training – Includes broad scale (ex., phishing) and specific/targeted training (ex, developers).
-Model risk – Includes validation of models.
-Fraud
-Negative news

*Don’t take data you’re not going to do anything with. You might not need this from every vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Penetration Test Results

A

-This can be difficult for you to get as this can show significant gaps in security.
-It’s okay if they’re not willing to share results to show that they’ve had a pen test.
-Third party completed pen test, data stamped showing they have results, but not the results
-We want to see that they did a pen test and had a pen test to show they closed the gaps
-Process to do pen test and close gaps of the pen test.
-Evaluate the scope of the pen test.
-E.g. if the pen test is on PHI and you don’t do anything with PHI then it’s irrelevant
-Are they completing pen tests on something that matters to you?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Independent Attestation

A

-Includes SOC2 and Type II reports
-Good for a year, usually being done annually

-FedRemMedium certification
-High trust certification
-Do NOT accept these in lou of a security assessment, they can supplement the security assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Policies and Procedures

A

Need to be careful about which ones you ask for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Proof of Key Controls to Evidence Effectiveness

A

E.g. Key control is MFA for privilege access, evidence would be MFA is enabled and process doc to show how it works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability Report

A

Redacted document may be provided, looking for the fact that they do this and they fix things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Continuous Monitoring Report

A

Vendor security rating tools, We’ll get into the danger of the report in relation to the score and the evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Employee Counts

A

-Includes key person dependency and any significant changes that have occurred
-is there someone in the organization that does the majority of the work?
-E.g. We had someone that had a lot of undocumented knowledge.
-We want to know how many employees are in certain areas so you can ensure there is good coverage and separation of duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Diagram

A

-Includes cloud architecture and a data flow diagram
-Where does the data flow? L1 or L2?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Background Checks

A

-Includes policies and samples of actual background checks
-Are they doing them? How often?
-Sample of background check redact name so you can see that they are doing them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Training

A

Includes broad scale (ex. phishing) and specific/targeted training (ex/ developers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Model Risk

A

-Includes validation of models
-If they’re producing a model, ask for validation of how they’re doing the modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fraud

A

-Do they have a fraud program?
-What are they doing?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly