How to identify, monitor, and audit vendors on your network

August 26, 2019//Tony Howlett

Last Updated: August 30, 2019

Using outside vendors can be a godsend for many organizations. These third parties provide the ability to scale a business, bring new and vital expertise to bear on problems, and let you concentrate on core competencies.

However, vendors can also bring a great deal of risk, especially when it comes to how they access your network and sensitive data. Since vendors are often given the ability to connect to a network through many different outlets, they may be hard to track, and that can leave you vulnerable to network intrusion by bad actors. Without the right cybersecurity solution in place, you can’t really tell how your vendors are connecting to your network, application, or server – and you won’t have the ability to track or audit them properly.

Create a third-party monitoring checklist

In order to mitigate the risks of remote vendor access, and gain better network access control, your organization should take steps to monitor third-party activity in greater detail. A good first step would be to create a third-party monitoring checklist, which might include actions such as:

  • Perform a periodic inventory of all remote connections allowed on your network to gain a complete picture of who has access to what parts of your network
  • Talk to department managers and data owners to fill in any knowledge gaps, to ensure you know where every connection is coming from and going to, and every third-party that’s been granted access
  • Decide which connections should be terminated (for example, for vendors no longer working for your organization), and which should be added, if any
  • Decide which internal processes should be used for provisioning inbound network connections and account setup, find out where the gaps are and how to improve them
  • Determine whether to apply policies for enterprise passwords (plus malware protection, firewalls, and software update checks) to accounts on inbound network connections
  • Review firewall and IDS/IPS configurations and rulesets to find and eliminate dormant ACLs or exceptions put in for vendors or other one-time needs. 
  • Decide if any added security standards are needed, then enforce them by using technical controls such as DLP, cloud access security broker, and SIEM technologies.

Audit third parties when giving remote access

Once a third-party monitoring checklist has been agreed upon and put into practice, the next challenge is the day-to-day monitoring of your network and the vendors who have access to it.

When it comes to your company’s crown jewels – its data – you want a network that is not just OK; you want “AAA”-OK. That is, the goal of a truly secure remote access solution should be to achieve a state of “All-Activity Awareness” – because your data will be the most secure when you can boost the visibility of all remote activity occurring on your network. 

How do you achieve a state of “AAA”-OK-ness? By properly auditing third parties who are given remote access to your network.

Verify vendor access levels on your network

There is an old saying: “Trust, but verify.” While the 20th-century use of this quote was in the context of international relations, it can be applied to 21st-century cybersecurity as well. You may trust your vendors enough to give them access to your network, but you need to verify what they are doing on your network, making sure they are only accessing the resources they require and not exhibiting any signs of suspicious or strange activity.

Implement a remote access platform

Proper auditing of remote vendor access achieves three vital goals:

  1. An ongoing audit ensures accountability and compliance.
  2. An audit trail and access notifications can set off alarms when unusual activity occurs.
  3. Granular audit records provide forensic details in the event of a breach or mistake to help track down the root cause and responsible party or parties. 

In order to achieve these goals, implement the following into your third-party remote access checklist: 

Real-time monitoring: when compliance is a must, you must know which vendors are on your network at all times. 

  • Maintaining total control: your platform must provide the ability to terminate or take control of third-party activity on your network
  • Tracking individual accounts: clarify the activity of individuals through unique identifiers and secure authentication
  • Creating audit trails: ensure activity reports are thorough enough to create clear accountability

Add a high-definition audit

The advantages of an advanced remote access platform, like the one offered by SecureLink, include the ability to record all sessions with a high-definition audit. Some features of a secure audit include:

  • Real-time specific knowledge of each vendor connection, why they are connecting, and the activity associated with each individual user
  • Customizable, contextual labels and tags to identify ticket numbers, requestor, and other organization-specific data.
  • Detailed information on file access, deletion, or information transfers tied to the vendor responsible
  • Review full video recordings of end-user support sessions and remote desktop sharing events
  • View Secure Socket Shell (SSH) commands and supported database activities.

A platform should offer network/IT security audit tools designed to give a total picture of all third-party remote access activity at the individual level. With its detailed audit functionality, organizations can ensure vendor accountability and compliance with industry regulations – and tech vendors can prove the “who, what, where, when, and why” of any remote support session.

The bottom line: total awareness means total security

A truly aware platform, such as SecureLink’s solution, will always let you know which vendors are accessing your precious company resources and how they are spending time on your network, which is the only way to ensure you’re truly secure.

With the platform’s vendor privileged access features, enterprises can manage their vendors’ remote access efficiently and securely, while giving tech vendors just the right amount of access to the applications and systems needed to complete their job – and nothing more. You don’t have to be in the dark any longer. Now you can shine a light on who’s doing what on your network, at all times, to get a complete picture of all third-party activity.

To learn more about remote access platforms and how to choose the right platform for you, check out our brochure that helps you better understand which is the best for you. 

Leave a Comment

close close