Guide icon
Guide

Managing Vendors and Third Parties

Vendor Vulnerability and Remediation Policy Template

by Josh More, IANS Faculty

Vendors are increasingly expected to follow internal security practices and to communicate those practices to their customers.

Requirements involve detecting and addressing vulnerabilities, as well as structuring the public document in a way customers find useful. This template provides vendor security teams with guidance on both internal and external approaches to vulnerability management.

Download this template to receive actionable, time-saving guidance on:

  • Laying out the expectations for internal workers, with specific details for specific systems, if needed.
  • Two approaches on alignment to the NIST Cybersecurity Framework to make it easy for customers to cross-reference claims against their specific requirements.

Complete the form and we’ll send a copy of the policy template to your email.

Fill out the form to receive your content download.  
* Required Fields
 

Featured IANS Content

Guide icon
Guide

Metrics and Reporting

Create Incident Response Metrics Worth Reporting

by Adrian Sanabria, IANS Faculty

Learn how to create IR metrics that focus on improvement and resonate with management using our 'Create Incident Response Metrics Worth Reporting' guide.

See Details
Guide icon
Guide

Cloud Network and Host Controls

Six Key Control Areas of Cloud Security

by Dave Shackleford, IANS Faculty

IANS Faculty, Dave Shackleford, explains the six key control areas of cloud security to help ensure your team adheres to foundational security practices.

See Details
Guide icon
Guide

Business Productivity

Top Ways to Configure M365 to Improve Security

by Aaron Turner, IANS Faculty

In this detailed guide, IANS explains the key considerations and recommends settings within five primary areas that will provide the best security return-on-investment (ROI) with the least user experience impacts.

See Details