Third-Party Software Security Checklist
by Richard Seiersen, IANS Faculty
While always a focus for security teams, third-party software security garnered more focus and attention following the SolarWinds breach. This checklist offers four high-level best practices for securing third-party software, each with one or more technology
solutions. Both commercial and open source solutions are included where available.