https://www.jetico.com/data-wiping/wipe-files-bcwipe
BCWipe is a data sanitization toolset.
Beyond Trust – 8 Steps to Reduce Remote Access Security Risks & Tighten Control over Vendor Access
3.1 3.1.14 3.7 3.7.6 Access Control Maintenance
https://www.beyondtrust.com/blog/entry/8-steps-to-reduce-remote-access-security-risks-tighten-control-over-vendor-access
This article provides an overview of steps organizations can take to reduce remote access security risks.
BeyondTrust – How to Secure Remote Access for Vendors & Employees: 10 Tips
3.7 3.7.5 3.7.6
https://www.beyondtrust.com/blog/entry/how-to-secure-remote-access-for-vendors-employees-10-tips
This Blog provides tips on how to secure remote access. There are links within the document to additional articles.
Broadcom – Five Best Practices to Manage and Control Third-Party Risk
3.7 3.7.5 3.7.6
https://docs.broadcom.com/doc/five-best-practices-to-manage-and-control-third-party-risk
This link provides 5 best practices for controlling third-party vendor risks.
https://www.cmu.edu/iso/tools/data-sanitization-tools.html
This is Carnegie Mellon University Information Security Office’s list of data sanitization tools that are acceptable for data per ISO Guidelines.
https://www.citrix.com/blogs/2019/04/04/security-best-practices-multi-factor-authentication/
This blog details security improvements that can be used to combat password spraying.
Colorado Department of Education – Hardware and Software Maintenance Policy
3.7 3.7.6 Maintenance
https://www.cde.state.co.us/dataprivacyandsecurity/hardwaresoftwaremaintenancepolicy
This link provide a sample policy from the Colorado Department of Education. It creates a formal process of maintaining hardware and software to ensure that a clearly defined set of procedures is used to manage system resources.
https://www.cde.state.co.us/dataprivacyandsecurity/removablemediapolicy&usg=AOvVaw3aIk5PfLf6y7roPaSYeub9
This is a sample removable storage policy for the Colorado Department of Education.
https://cybersheath.com/resources/blog/how-multi-factor-authentication-protects-your-business/
This article highlights MFA and the necessity to implement to all privileged account access and users who access network resources.
Delinea – Limit Privileged Access for Third-Party Vendors Without Restricting their Ability to Get Work Done
3.7 3.7.5 3.7.6
https://delinea.com/blog/limit-access-for-third-party-vendors
This link provides specific processes you can use, and how those strategies can be applied to some of the different types of vendor engagements you need to support.