In
white-box testing, internal details of the product (scheme, design, source code, etc) are studied, and with the information obtained, tests are designed to verify operation and behavior. This testing is only possible if the manufacturer provides
the proper information, which in many cases is not possible for fear of information leaking to potential competitors. Only large customers or organizations, that can guarantee confidentiality and that can provide the manufacturer with benefits higher than the risk of leakage, would be able to obtain the necessary white information.
592.
In
black-box testing, internal details of the product are ignored, and operation and behavior are studied through a test protocol based on specially designed inputs that require a specific output.
593.
A third-party management process requires six phases definition and establishment of the management team, preparation and implementation of the awareness plan, its own IT inventory analysis, third- party inventory development, action plan, and assessment.
594.
The risk management team must direct the entire management cycle, from awareness to assessment. It must be made up of experts in the cybersecurity of the organization’s systems, products and services, quality control, hiring processes and legal issues.
595.
In most cases, it will be necessary to develop and implement a third-party
risk awareness plan geared towards senior leaders, since, despite the fact that third-party risk can have serious consequences for the organization, it is either usually non-occurring or not perceived in an obvious or evident way.
596.
Its own IT inventory provides essential information to identify current third parties in support and maintenance tasks and potential future third parties (manufacturers, suppliers and distributors).
597.
A third-party inventory identifies current and potential third parties (manufacturers, suppliers, distributors, carriers, support and maintenance services for systems and services critical to the organization) and possible security breaches throughout the process (manufacturing, transportation, distribution, provision, implementation, startup, operation, update, evolution, customization and maintenance).
598.
An action plan details the concrete
measures to be implemented, based on a realistic and efficient strategy. Some aspects to consider are nondisclosure agreements (NDA), vulnerability reporting agreements, employee background checks, accreditation or certification of third parties or their products as a requirement in hiring processes, cybersecurity requirements throughout the hiring cycle from design to commissioning, reviews of compliance with cybersecurity measures by third parties, advice by third parties on the security of the systems provided, possibility of remote support, requirement of periodic tests, security audits, service level agreements (SLAs) and good practice guides.
GUÍA DE
Share with your friends: