Third-Party Software Security Checklist
by Richard Seiersen, IANS Faculty
While always a focus for security teams, third-party software security garnered more focus and attention following the SolarWinds breach. This checklist offers four high-level best practices for securing third-party software, each with one or more technology
solutions. Both commercial and open source solutions are included where available.
In this checklist you will find details on the following:
- Dependencies
- Hygiene
- Trusted sources
- Policy-as-Code
- GitOps overview/rationale and measurement
Complete the form and we'll send a copy of the Third-Party Security Checklist to your email.