This Blog provides tips on how to secure remote access. There are links within the document to additional articles. This link provides 5 best practices for controlling third-party vendor risks. This link provide a sample policy from the Colorado Department of Education. It creates a formal process of maintaining hardware and software to ensure that a clearly defined set of procedures is used to manage system resources. This link provides specific processes you can use, and how those strategies can be applied to some of the different types of vendor engagements you need to support. From the Department of Homeland Security, these are recommended practices for configuring and managing remote access for control systems covering various roles including vendors, field technicians, business partners (all of which may have differing requirements.) The organization: a. Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel; b. Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and c. Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations. This is State of North Carolina’s IT System Maintenance policy and provides an example of the roles, responsibilities and various components of maintenance supervision. To move your business forward and propel growth, you need to be able to trust your third parties and their security posture.
This document provides self-assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 1. This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 2. This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 3. The purpose of this publication is to provide procedures for assessing the CUI requirements in NIST Special Publication 800-171.