Other questions to consider: How do we identify who has access? After third parties have access, how quickly can we sever access to our systems and data?
The Driver Behind This
This expands on the previous question from the last post, adding additional granularity to the matter. Specifically, which third parties have access to regulated/sensitive data your organization has been entrusted with? This includes everything from cloud applications to service providers (e.g., HRIS, ERP, CRM systems). It doesn’t matter if the system is onsite managed by a third party (i.e., HVAC system) or hosted offsite (i.e., Amazon Web Services), you need to know who has access to your data (and why?). Accept that an adversary will consider all available attack vectors, to include your providers, business partners and vendors. These are common attack vectors used to gain access to systems as they advance on their objectives.