Checklist
Vendor and Partner Management
Third-Party Software Security Checklist
Richard Seiersen, IANS Faculty
While always a focus for security teams, third-party software security garnered more focus and attention following the SolarWinds breach. This checklist offers four high-level best practices for securing third-party software, each with one or more technology solutions. Both commercial and open source solutions are included where available.
In this checklist you will find details on the following:
- Dependencies
- Hygiene
- Trusted sources
- Policy-as-Code
- GitOps overview/rationale and measurement
Complete the form and we'll send a copy of the Third-Party Security Checklist to your email.
Find similar resources
Guide
Cloud Network and Host Controls
Six Key Control Areas of Cloud Security
IANS Faculty, Dave Shackleford, explains the six key control areas of cloud security to help ensure your team adheres to foundational security practices.
Dave Shackleford, IANS Faculty
Guide
Business Productivity
Top Ways to Configure M365 to Improve Security
In this detailed guide, IANS explains the key considerations and recommends settings within five primary areas that will provide the best security return-on-investment (ROI) with the least user experience impacts.
Aaron Turner, IANS Faculty
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.