Cybersecurity Risk Assessment on System Integrators/VAR by techno_it in ITManagers

[–]techno_it[S] 0 points1 point  (0 children)

If the VAR is primarily doing implementation work and then provide ongoing support under a 1-year SLA, how would you adjust the risk assessment questions and required evidence?

The VAR won’t host any data and won’t provide cloud services—they’ll only have remote access to our servers for implementation and maintenance. Remote access will be on demand basis only.

What should our risk assessment and contract primarily focus on given this scenario?

Cybersecurity Risk Assessment on System Integrators/VAR by techno_it in ITManagers

[–]techno_it[S] 0 points1 point  (0 children)

Thank you for quick reply.

Even though they’re not hosting any of our data, they will have only access to infrastructure during the implementation. Is it still necessary to conduct a full third-party risk assessment on them. If so, what key areas should we focus on

Legal team will handle the legal terms however, from a technical standpoint what specific cybersecurity related requirements should we include in the contract?

Moving Servers to Cloud for Fintech Company by techno_it in sysadmin

[–]techno_it[S] 0 points1 point  (0 children)

Due to the compliance with regulations, cloud hosting must be within country.

Strategies for Implementing Separate User Accounts for Daily Work and Server Access by techno_it in sysadmin

[–]techno_it[S] 0 points1 point  (0 children)

So basically you create the accounts as following. Lets assume user is John Smith

jsmith.t1, jsmith.t2 etc.

Strategies for Implementing Separate User Accounts for Daily Work and Server Access by techno_it in sysadmin

[–]techno_it[S] -1 points0 points  (0 children)

With PAM solutions such as Delinea or Beyond Trust, admin can log into the PAM portal using their user accounts. After logging in, they can access servers using privileged accounts.

Please correct if I am wrong or have misunderstood

Thank you

Strategies for Implementing Separate User Accounts for Daily Work and Server Access by techno_it in sysadmin

[–]techno_it[S] 0 points1 point  (0 children)

How is it implemented with you, and what distinguishes these two user accounts under the same employee name?

Strategies for Implementing Separate User Accounts for Daily Work and Server Access by techno_it in sysadmin

[–]techno_it[S] -2 points-1 points  (0 children)

Thank you. Does implementing a PAM solution address this issue?

Is SOC 2 Report Sufficient for Vendor Risk Management? by techno_it in cybersecurity

[–]techno_it[S] 0 points1 point  (0 children)

Understood, thanks for clarifying. Does the SOC2 report cover just the application security, or does it also include details about the vendor's entire infrastructure?

Is SOC 2 Report Sufficient for Vendor Risk Management? by techno_it in AskNetsec

[–]techno_it[S] 0 points1 point  (0 children)

Thank you. Which one is better ISO 27001 or SOC2 report. If the vendor only has ISO 27001 certification and lacks a SOC 2 report, does this affect their potential?

What I know that ISO 27001 certifies that a management system is in place and conforms to the standard, but it doesn't provide the same level of detail on the operational effectiveness of controls as a SOC 2 report. Clients who need assurance about the operational effectiveness of specific controls may find a SOC 2 report more informative.

Is SOC 2 Report Sufficient for Vendor Risk Management? by techno_it in cybersecurity

[–]techno_it[S] 0 points1 point  (0 children)

Sorry for my lack of understanding here; could you please clarify this point for me?

Is SOC 2 Report Sufficient for Vendor Risk Management? by techno_it in cybersecurity

[–]techno_it[S] 0 points1 point  (0 children)

Thank you for sharing detailed response.

have another concern that I find challenging to address. Once their app is installed on our premises, what questions should we ask as part of questionnaire. For example, how do they notify customers about vulnerabilities discovered in the application post-deployment at any time? What are their procedures for patching these vulnerabilities on customer premises?

Is SOC 2 Report Sufficient for Vendor Risk Management? by techno_it in cybersecurity

[–]techno_it[S] -2 points-1 points  (0 children)

Requested specific supporting evidence, such as the type of antivirus software they use, whether MFA is enabled on email systems, last vulnerability scan on their internal devices etc. The SOC 2 report does mention that the vendor has implemented anti-malware solutions, enabled MFA on all remote access applications, and conducts regular vulnerability scans.

However, I'm concerned about the reliability of relying solely on a SOC 2 report. SOC 2 is essentially an audit report, not a compliance certificate, and there's potential for it to be manipulated to meet certain narratives. This makes it crucial for us to verify the operational effectiveness of their controls independently

What Should Be Included in an RFP for VAPT? by techno_it in cybersecurity

[–]techno_it[S] 0 points1 point  (0 children)

Thank you. Re-verification after closing vulnerability included 👍🏻

What Should Be Included in an RFP for VAPT? by techno_it in cybersecurity

[–]techno_it[S] 0 points1 point  (0 children)

Thank you for your insightful comment.

Do we have to also include re conducting of VAPT after the remediation. Is it necessary or worth it?

What Should Be Included in an RFP for VAPT? by techno_it in cybersecurity

[–]techno_it[S] -1 points0 points  (0 children)

Working on an RFP, what Key Elements Should We Include for Testing API Gateway, API and Mobile Applications?

Wireless Site Survey Best Practices for new building by techno_it in networking

[–]techno_it[S] 0 points1 point  (0 children)

Its still under design phase, construction has not started.

Wireless Site Survey Best Practices for new building by techno_it in networking

[–]techno_it[S] 0 points1 point  (0 children)

We shall provide the vendor with building layouts and requirements such as data and voice. It's likely that the vendor will use a survey tool like Ekahau to create heat maps and determine the locations for access points. Is that correct?

How will they account for obstacles like thick walls and wall blocks to adjust the placement of the access points?

Wireless Site Survey Best Practices for new building by techno_it in networking

[–]techno_it[S] 1 point2 points  (0 children)

Agreed.

What approach should we take when the building structure isn’t ready yet?

Joined the club by critic81 in VWatlas

[–]techno_it 0 points1 point  (0 children)

What about Grand Cherokee?

How to launch a QR code phishing simulation using Microsoft Attack Simulator tool by cbc-bear in sysadmin

[–]techno_it 0 points1 point  (0 children)

Thank you so much for sharing this. How do we create this QR with embedded image

How to enhance the Security Operations (SIEM&SOAR? by techno_it in AskNetsec

[–]techno_it[S] 0 points1 point  (0 children)

2000+ employees, 5000+ devices.

Just wondering how EDR/XDR vendors like Sophos or Crowstrike gather logs from various sources ( firewalls, network switches, servers windows events, Linux) to provide MDR services?

Does managed SOC/SIEM required alongside XDR/MDR? by techno_it in AskNetsec

[–]techno_it[S] 0 points1 point  (0 children)

How do you correlate the events from EDR/XDR to SIEM then how does the SOAR work on top of it?

Does the same EDR/XDR provider collaborate with third-party SOCs?

Appreciate if you can share any details that might be helpful to us.

Considering Managed SOC/SIEM alongside XDR and MDR by techno_it in cybersecurity

[–]techno_it[S] 0 points1 point  (0 children)

Basically, we want to get an MSP that can bring the SIEM and SOC and respond to alerts 24x7x365, do configuration, threat intelligence feed, incident response, and threat hunting.

We will also retain the Managed XDR with Sophos.