Section 10.90 Third-party Vendor Risks & Supply Chain Risks Flashcards

Objectives 2.2 Explain common threat vectors and attack surfaces. Objectives 2.3 Explain various types of vulnerabilities. Objectives 5.3 Explain the processes associated with third-party risk assessment and management.

1
Q

Third-party Vendor Risks

A

Potential security and operational challenges from external collaborators e.g Vendors, suppliers or service providers.

Risk: Impact on integrity, data security, and overall business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Supply Chain Risks 1

Hardware Manufacturers

A

Products like routers and switches are composed of many components from various suppliers

Rigorous supply chain assessments needed to trace origins and component integrity

Component tampering or untrustworthy vendors can introduce vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardware Manufacturers

Secondary/Aftermarket Sources

A

Risk of acquiring counterfeit or tampered devices

Budget-friendly but high-risk option

Devices may contain malware or vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Supply Chain Risks 2

Software Developers/Providers

A

Check for proper licensing, authenticity, known vulnerabilities, and malware

Proprietary software can be scanned for vulnerabilities

Open-source software allows source code review

Software developers and software providers are integral cogs in the supply chain however software can introduce vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Supply Chain Risks 3

Service Providers/MSPs

A

Organisations that provide a range of technology services and support to businesses and other clients

● Data confidentiality and integrity concerns

● Assess provider’s cybersecurity protocols and support for security
incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Third-party Vendor Considerations

A

● Evaluate data security measures

● Ensure confidentiality and integrity

● Assess cybersecurity protocols

● Response to a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly