Beyond Trust – 8 Steps to Reduce Remote Access Security Risks & Tighten Control over Vendor Access
3.1 3.1.14 3.7 3.7.6 Access Control Maintenance
https://www.beyondtrust.com/blog/entry/8-steps-to-reduce-remote-access-security-risks-tighten-control-over-vendor-access
This article provides an overview of steps organizations can take to reduce remote access security risks.
BeyondTrust – How to Secure Remote Access for Vendors & Employees: 10 Tips
3.7 3.7.5 3.7.6
https://www.beyondtrust.com/blog/entry/how-to-secure-remote-access-for-vendors-employees-10-tips
This Blog provides tips on how to secure remote access. There are links within the document to additional articles.
Broadcom – Five Best Practices to Manage and Control Third-Party Risk
3.7 3.7.5 3.7.6
https://docs.broadcom.com/doc/five-best-practices-to-manage-and-control-third-party-risk
This link provides 5 best practices for controlling third-party vendor risks.
Colorado Department of Education – Hardware and Software Maintenance Policy
3.7 3.7.6 Maintenance
https://www.cde.state.co.us/dataprivacyandsecurity/hardwaresoftwaremaintenancepolicy
This link provide a sample policy from the Colorado Department of Education. It creates a formal process of maintaining hardware and software to ensure that a clearly defined set of procedures is used to manage system resources.
Delinea – Limit Privileged Access for Third-Party Vendors Without Restricting their Ability to Get Work Done
3.7 3.7.5 3.7.6
https://delinea.com/blog/limit-access-for-third-party-vendors
This link provides specific processes you can use, and how those strategies can be applied to some of the different types of vendor engagements you need to support.
Department of Homeland Security – Configuring and Managing Remote Access for Industrial Control Systems
3.7 3.7.5 3.7.6
https://www.cisa.gov/sites/default/files/recommended_practices/RP_Managing_Remote_Access_S508NC.pdf
From the Department of Homeland Security, these are recommended practices for configuring and managing remote access for control systems covering various roles including vendors, field technicians, business partners (all of which may have differing requirements.)
Medium – Monitoring Applications to Prevent Unauthorized Access
3.7 3.7.6 Maintenance
https://medium.com/@cybersiftIO/monitoring-applications-to-prevent-unauthorised-access-ea79d64dba5c
Privileged account access and how it can be used in a malicious way to gain access and how to protect against it.
https://nvd.nist.gov/800-53/Rev4/control/MA-5
The organization: a. Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel; b. Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and c. Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
North Carolina – IT System Maintenance Policy
3.7 3.7.5 3.7.6 Maintenance
https://it.nc.gov/documents/statewide-policies/scio-maintenance/download?attachment
This is State of North Carolina’s IT System Maintenance policy and provides an example of the roles, responsibilities and various components of maintenance supervision.
Security Scorecard – Best Practices for Trusted Third-Party Risk Management
3.7 3.7.5 3.7.6
https://securityscorecard.com/blog/best-practices-for-trusted-third-party-risk-management/
To move your business forward and propel growth, you need to be able to trust your third parties and their security posture.