Ask potential application service providers the following questions, supplied by Greg Gianforte, CEO of ASP RightNow Technologies. There isn’t a single set of correct answers; the point is that a few simple yes and no questions won’t generally get you enough information to know whether the ASP offers an appropriate level of security for your particular application.Physical Security Describe the physical security and disaster recovery and prevention features of the ASP’s data center. Who (including data center staff, other employees and vendors) has physical access to the host servers? Network Security Are industry-standard firewalls deployed? Where are they deployed? How does the ASP keep the software for the firewalls current? Is administrative access to firewalls and other perimeter devices allowed only through secure methods or direct serial port access? What protocols and ports are allowed to traverse the network and firewall? Does the ASP use intrusion detection systems (IDSs)? How long are IDS logs kept? Are formal incident-response procedures in place? Are they tested regularly? Does the ASP engage third-party security services providers to perform ongoing vulnerability assessments? Systems Security Are ongoing vulnerability assessments performed against the systems? Are file permissions set on a need-to-access basis only? How are operating systems kept up-to-date? How does the ASP keep abreast of software vulnerabilities? What is the procedure for installing software updates? Are audit logs implemented on all systems that store or process critical information? Are root commands logged? What change management procedures are in place? Staff Security What are the credentials of the systems administration staff? Has the systems administration staff undergone complete background and criminal checks? Are hosting staff onsite or on-call 24/7? Security Policy Describe the user account and password policy. Are screen-blanking mechanisms deployed on all employee workstations? Do sessions automatically time out after an idle period? Are user accounts for contract personnel created with expiration dates? How are user accounts closed after termination? Related content news Okta confirms recent hack affected all customers within the affected system Contrary to its earlier analysis, Okta has confirmed that all of its customer support system users are affected by the recent security incident. By Shweta Sharma Nov 30, 2023 3 mins Data Breach Cyberattacks Cybercrime news Top cybersecurity product news of the week New product and service announcements from Wiz, Palo Alto Networks, Sophos, SecureAuth, Kasada, Lacework, Cycode, and more. By CSO staff Nov 30, 2023 17 mins Generative AI Security feature How to maintain a solid cybersecurity posture during a natural disaster Fire, flood, eathquake, hurricane, tornado: natural disasters are becoming more prevalent and they’re a threat to cybersecurity that isn’t always on a company’s radar. Here are some ways to prepare for the worst. By James Careless Nov 30, 2023 8 mins Security Operations Center Data and Information Security Security Practices news analysis Attackers could abuse Google's SSO integration with Windows for lateral movement Compromised Windows systems can enable attackers to gain access to Google Workspace and Google Cloud by stealing access tokens and plaintext passwords. By Lucian Constantin Nov 30, 2023 8 mins Multi-factor Authentication Single Sign-on Remote Access Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe