Infrastructure security is a pillar of cybersecurity that focuses on protecting critical systems, hardware, and software assets from physical and cyber threats.
Both cyber threats and physical threats can cause significant damage to an organization’s infrastructure security. Common cyber threats that aim to exploit an organization’s network infrastructure include phishing attempts, ransomware, malware, distributed denial of service (DDoS) exploits, firewall attacks, and Internet of Things (IoT) attacks. Physical threats include natural disasters, utility disruptions, and vandalism.
Organizations that partner with third-party vendors and maintain extensive supply chains must assess the strength of their internal infrastructure security programs and evaluate their vendors’ security practices. The best way to determine the infrastructure security of third-party vendors is by developing a detailed infrastructure security questionnaire.
Keep reading to discover what questions to ask your vendors, and download our FREE PDF Infrastructure Security Questionnaire Template to help build out your organization’s vendor questionnaire.
Learn more about UpGuard’s complete Vendor Risk Management solution>
Organizations rely on technology, operating systems, and data assets to maintain operations and business continuity. Developing a robust infrastructure security program helps an organization prevent cyber attacks, data breaches, and other disruptions that could cause significant harm to its reputation or profitability.
The main benefits of infrastructure security are:
When creating an infrastructure security questionnaire, it’s important to consider asking vendors questions that cover each of the following categories:
Here are a few questions in each category that your organization can use to build out its infrastructure security questionnaire.
1. How does your organization encrypt sensitive data or information during transmission?
2. How does your organization encrypt sensitive information or data at rest?
3. What industry-standard protocols does your organization follow for data encryption?
1. Does your organization have protocols in place to manage user access to critical systems and data?
2. If yes, explain your user access management system
3. If no, explain why your organization has not yet implemented user access controls.
4. Please describe your organization’s account authentication and authorization process.
1. Does your organization currently have an incident response plan in place?
2. If yes, please describe this incident response plan and how your organization has handled security breaches in the past.
3. If no, please explain if your organization is currently designing an incident response plan or why it has not pursued such a plan.
4. Does your organization have a dedicated security team?
5. How does your organization detect security incidents?
6. How quickly does your organization respond to security incidents?
1. Does your organization currently have a business continuity plan in place?
2. If yes, please describe this business continuity plan and how your organization has handled security breaches in the past.
3. If no, please explain if your organization is designing a business continuity plan or why it has yet to pursue it.
1. What security controls does your organization have in place to protect your network infrastructure from unauthorized access?
2. How does your organization protect its networks and data from unauthorized access?
3. How does your organization detect unauthorized access?
4. What remediation process does your organization follow when it detects a network intrusion?
1. How does your organization protect its physical data centers or critical infrastructure from unauthorized access?
2. What security policies does your organization have in place to manage user validation and access to physical data centers?
1. How often does your security team conduct security assessments to evaluate internal security standards and manage cybersecurity risk?
2. How often does your security team conduct self-assessments to evaluate how it manages risk inherited from third-party service providers?
3. Does your organization conduct penetration testing or other preventative tests regularly?
4. Has your organization completed relevant certifications (ISO 27001 or comparable framework)?
1. How does your organization assess the security practices of your third-party vendors?
2. Does your organization send risk assessment questionnaires to vendors regularly?
2. What security requirements does your organization impose upon its vendors?
1. How often does your organization perform data backups or cloud security recovery maintenance?
1. How does your organization train employees and key stakeholders on the importance of cybersecurity best practices?
2. What security program does your organization have in place to promote a culture of healthy cyber hygiene?
1. How does your organization ensure continued compliance with industry data protection and privacy regulations (GDPR, HIPAA, etc.)?
2. How does your organization handle new compliance standards when they arise?
1. How does your organization document security incidents when they occur?
2. How does your organization communicate security incidents to relevant customers?
1. Does your organization hold a cyber insurance policy?
2. If yes, what does your organization’s policy cover?
3. If no, will your organization pursue a cyber insurance policy in the future?
UpGuard is an all-in-one SaaS cybersecurity solution that grants users access to a comprehensive questionnaire library that includes an infrastructure security vendor questionnaire and other security questionnaires that meet industry standards for data security and physical security. Organizations looking to improve their vendor due diligence protocols and develop robust Third-Party Risk Management programs can use UpGuard’s library of questionnaires to identify and mitigate information security risks throughout the third-party vendor lifecycle.
In addition to its comprehensive library of security questionnaires, UpGuard Vendor Risk also provides organizations access to several other powerful Cyber Vendor Risk Management tools.
Notable features and use cases of UpGuard Vendor Risk include: