October 12, 2018 | Content Aggregator - Single Slide | Vendor and Partner Management
— INSIGHTS PORTAL —>
Please Login to continue or Become a Client
When assessing the security of a third-party API, it is important to analyze its surface area, content, functionality and associated technologies. This tool details some common issues to check for and address.
This tool provides a checklist of questions designed to uncover risk in a third party. The questions primarily focus on the confidentiality, integrity and availability (CIA) of data, but they also address general business risks. Please note: In each case, the questions focus on how you may incur liability or be injured by a risk resulting from your own activities or those of a client, customer, vendor or supplier.
Nearly half of U.S. states (43%) outsource their cyber threat risk assessments to a third party. About a third (32%) have outsourced forensics and 30 percent outsource audit log analysis.
Each IANS Topic Guide addresses a single information security issue from a planning, deployment and maintenance perspective. In this installment, we focus on vendor management.
By continuing to use our website, you consent to our
cookie usage and revised Privacy Statement.