External vulnerability scans are conducted by an approved third party vendor on a quarterly basis.
Utilization of a third party vendor to scan and validate potential vulnerability results provides checks and balances against our internally conducted scanning processes. Additionally, the third party scanning provides the view of our external network risk that can be potentially exploited to gain access to our environment.
This control applies to externally facing systems of our production environment that are in-scope for SOC2.
Control Owners:
Security Operations
Process owner(s):
Security Operations
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the Approved Scanning Vendor control issue.
Examples of evidence an auditor might request to satisfy this control:
Scanning results reports demonstrating IllumiDesk's externally-facing, in-scope PCI systems are scanned by an approved vendor on a quarterly basis.
SOC2 CC
CC4.1