VUL.1.03 - Approved Scanning Vendor
Control Statement
External vulnerability scans are conducted by an approved third party vendor on a quarterly basis.
Context
Utilization of a third party vendor to scan and validate potential vulnerability results provides checks and balances against our internally conducted scanning processes. Additionally, the third party scanning provides the view of our external network risk that can be potentially exploited to gain access to our environment.
Scope
This control applies to externally facing systems of our production environment that are in-scope for SOC2.
Ownership
Control Owners:
Security Operations
Process owner(s):
Security Operations
Additional control information and project tracking
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the Approved Scanning Vendor control issue.
Examples of evidence an auditor might request to satisfy this control:
Scanning results reports demonstrating IllumiDesk's externally-facing, in-scope PCI systems are scanned by an approved vendor on a quarterly basis.
Framework Mapping
SOC2 CC
CC4.1
Last updated