Best Practices for Vendor Access:The EC-Council CISO framework emphasizes secure and controlled access for third-party vendors to reduce risks of unauthorized access, data breaches, or misuse.
Key Reasons for Option C:
Company-Supplied Laptop: Ensures compliance with internal security policies and avoids risks associated with unmanaged devices.
Two-Factor Authentication (2FA): Adds an essential layer of security to prevent unauthorized access.
Unique Credentials: Ensures accountability and enables tracking of vendor activities, reducing shared credential risks.
Option B: While 2FA is used, shared credentials are still a risk.
Option D: Vendor's own laptop introduces risks from unverified device configurations.
EC-Council CISO Emphasis:This approach aligns with best practices in third-party risk management, ensuring vendor access is secure, traceable, and compliant.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit