Third-party Vendor Risks Flashcards

(17 cards)

1
Q

What are the potential security and operational challenges from external collaborators?

A
  • Impact on integrity
  • Data security
  • Overall business continuity

These challenges arise from third-party vendor risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Threat Vectors.

A

Paths attackers use to gain access

Understanding threat vectors is crucial for identifying potential security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Attack Surfaces.

A

Points where an unauthorized user can try to enter

Identifying attack surfaces helps in strengthening security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the various types of vulnerabilities.

A
  • Hardware Vulnerabilities
  • Software Vulnerabilities
  • Operational Vulnerabilities

Each type of vulnerability poses different risks to security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is involved in Vendor Assessments?

A
  • Pre-partnership assessment
  • Penetration Testing
  • Audit Rights
  • Evidence Collection

Vendor assessments are crucial for evaluating security before partnerships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the importance of Vendor Selection and Monitoring?

A
  • Meticulous selection process
  • Ongoing monitoring of vendor performance

Ensures that vendors continue to meet security and operational standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the types of Contracts and Agreements?

A
  • Basic Contracts
  • Service Level Agreements (SLAs)
  • Memorandum of Agreement (MOA)
  • Memorandum of Understanding (MOU)
  • Master Service Agreement (MSA)
  • Statement of Work (SOW)
  • Non-Disclosure Agreement (NDA)
  • Business Partnership Agreement (BPA)

Each type serves a specific purpose in formalizing relationships and expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Penetration Testing involve?

A

Simulated cyberattacks to identify vulnerabilities in supplier systems

Validates supplier’s cybersecurity practices and potential risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or false: Supply Chain Attacks target the primary target directly.

A

FALSE

Supply chain attacks exploit vulnerabilities in suppliers or service providers to access more secure systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the CHIPS Act of 2022?

A

U.S. federal statute providing funding to boost semiconductor research and manufacturing

Aims to reduce reliance on foreign-made semiconductors and enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the considerations for selecting service providers?

A
  • Evaluate data security measures
  • Ensure confidentiality and integrity
  • Assess cybersecurity protocols

These considerations are crucial for maintaining security in service provision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of Vendor Questionnaires?

A

Provide insights into operations, capabilities, and compliance

Standardized criteria for fair and informed decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Right-to-Audit Clause?

A

Contract provision allowing organizations to evaluate vendor’s internal processes for compliance

Ensures transparency and adherence to standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Internal Audits entail?

A

Vendor’s self-assessment of practices against industry or organizational requirements

Demonstrates commitment to security and quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Service Level Agreement (SLA)?

A

Defines the standard of service a client can expect from a provider

Includes performance benchmarks and penalties for deviations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between a Memorandum of Agreement (MOA) and a Memorandum of Understanding (MOU)?

A
  • MOA: Formal, outlines specific responsibilities and roles
  • MOU: Less binding, expresses mutual intent without detailed specifics

Both documents serve to clarify relationships but differ in binding nature.

17
Q

What is a Business Partnership Agreement (BPA)?

A

Outlines partnership nature, profit-sharing, decision-making, and exit strategies

Defines ownership of intellectual property and revenue distribution.