GTAG: Assessing Cybersecurity Risk The Three Lines Model
Table 4
Conduct cyber risk assessments of service organizations, third parties, and suppliers (note: first and second line roles share this ongoing responsibility).
A. Assessments of third parties and suppliers. This activity involves evaluating the security practices and risks associated with third-party vendors and suppliers, which requires collaboration and oversight from all three lines of defense: management (first line), risk management and compliance functions (second line), and internal audit (third line).
Or maybe in fact it should be C after reading more carefully. Each dept classifies data and design access privileges for its dept members to keep segregation of duties and adequate access rights assignment.
Copy pasted from GTAG Page 12: "Conduct cyber risk assessments of service organizations, third parties, and suppliers (note: first and second lines of defense share this ongoing responsibility)"
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
137a7a9
2 weeks, 1 day agoemtofid
2 months, 1 week agoKonradK
1 year, 3 months agoKonradK
1 year, 1 month agoElvin
1 year, 1 month agoElvin
1 year agoKLynn
6 months, 4 weeks ago