Checklist
Vendor and Partner Management

Third-Party Software Security Checklist

Richard Seiersen, IANS Faculty

While always a focus for security teams, third-party software security garnered more focus and attention following the SolarWinds breach. This checklist offers four high-level best practices for securing third-party software, each with one or more technology solutions. Both commercial and open source solutions are included where available.

In this checklist you will find details on the following:

  • Dependencies
  • Hygiene
  • Trusted sources
  • Policy-as-Code
  • GitOps overview/rationale and measurement

 

Complete the form and we'll send a copy of the Third-Party Security Checklist to your email.

Request your free content download