Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

How To Assess the Cybersecurity Preparedness of IT Service Providers and MSPs

How To Assess the Cybersecurity Preparedness of IT Service Providers and MSPs

Improperly evaluating the cybersecurity capabilities of prospective IT service providers and managed service providers (MSPs) can put your organization's data and systems at risk. A new guide from CompTIA can help you ask the right questions.

Your cyber attack surface isn’t limited to your owned assets. It also includes all the third parties – such as vendors, suppliers and contractors – that your systems are digitally intertwined with. If one of these partners gets breached, the attackers could find a pathway to also hack your systems.

In this broad and complex realm of managing third-party cyber risk, it’s particularly critical for organizations to closely, methodically and precisely assess the cybersecurity preparedness of IT service providers and managed service providers (MSPs).

That’s the focus of a new guide published recently by the non-profit Computing Technology Industry Association (CompTIA). Although “A CEO’s Guide to Choosing an IT Service Provider” is aimed at business leaders, it can also help IT and cybersecurity leaders ask the right questions while choosing ITSPs and MSPs.

Cybersecurity vendor third-party risk management

The 18-page document, created by CompTIA’s Cybersecurity Advisory Council, consists of detailed questionnaires covering areas including:

  • Frameworks and compliance
  • Policies
  • Privilege account management
  • Systems management
  • Incident response
  • Patch and vulnerability management
  • Detection and prevention

For example, the section titled “Critical Patch and Vulnerability Management” seeks to answer – among other things – whether the service provider in question:

  • has a documented VM program
  • conducts regular VM assessments of its systems
  • remediates and patches vulnerabilities in a timely manner

In the “Frameworks / Compliance” section, MSPs and IT service providers must say whether they:

  • use a cybersecurity framework for managing their systems
  • document and audit their compliance
  • support governance requirements or cyber insurance obligations

Meanwhile, the “Detection / Prevention” section looks into a respondent’s ability to continuously monitor, detect and respond to cyber incidents. Specific questions address topics like:

  • the use of infrastructure monitoring tools
  • log management processes and policies
  • data encryption use

“The goal is to provide more clarity about how MSPs treat their own systems so that customers might better understand where their information is stored, how access will occur, and what happens in the event of a cyber incident,” reads a CompTIA blog about the guide.

Of course, organizations can also use the document to periodically evaluate IT service providers and MSPs they’re already working with to ensure that their cybersecurity preparedness hasn’t degraded.

The guide can also be used by MSPs and IT service providers to self-assess and identify potential weaknesses in their cybersecurity policies, strategies, processes and capabilities that could put them and their customers at an increased risk for cyberattacks.

For more information about third-party vendor risk management:

VIDEOS

How SMBs should select a security-savvy managed service provider (IDG Tech Talk)

Rethinking Efficient Third-Party Risk Management (RSA Conference)

A CISO Developed Third Party Risk Management Framework (Cybersecurity Collaborative)

Third-Party Risk Management: Preventing the Next Stuxnet (RSA Conference)

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Tenable Vulnerability Management trials created everywhere except UAE will also include Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Tenable Vulnerability Management trials created everywhere except UAE will also include Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now