Checklist icon

Vendor and Partner Management

Third-Party Software Security Checklist

by Richard Seiersen, IANS Faculty

While always a focus for security teams, third-party software security garnered more focus and attention following the SolarWinds breach. This checklist offers four high-level best practices for securing third-party software, each with one or more technology solutions. Both commercial and open source solutions are included where available.

In this checklist you will find details on the following:

  • Dependencies
  • Hygiene
  • Trusted sources
  • Policy-as-Code
  • GitOps overview/rationale and measurement


Complete the form and we'll send a copy of the Third-Party Security Checklist to your email.

Fill out the form to receive your content download.  
* Required Fields

Featured IANS Content

Guide icon

Identity and Access Management

Privileged Access Management (PAM) Decision-Maker

by Idan Shoham, IANS Faculty

Download the 'Privileged Access Management Decision-Maker' guide by IANS Faculty, Idan Shoham, to determine which accounts should be managed by a PAM process.

See Details
Guide icon

Cloud Network and Host Controls

Six Key Control Areas of Cloud Security

by Dave Shackleford, IANS Faculty

IANS Faculty, Dave Shackleford, explains the six key control areas of cloud security to help ensure your team adheres to foundational security practices.

See Details
Guide icon

Business Productivity

Top Ways to Configure M365 to Improve Security

by Aaron Turner, IANS Faculty

In this detailed guide, IANS explains the key considerations and recommends settings within five primary areas that will provide the best security return-on-investment (ROI) with the least user experience impacts.

See Details