Posted on May 3rd, 2018
Posted By TGSI
Security requirements of outsourcing work. More than just VPN, more than just two factor authentication. More than just adaptability are fundamentals which a good outsourcing relationship must consider. Here a brief security checklist to ensure diligence in data security.
Checklist for secure outsourcing:
Primary Assertion: It takes careful planning and experience to establish data security for remote connections. Our process to do this is mature and we have the capability to articulate the steps necessary to launch new connections securely and rapidly. Managing data risk should be high on the priorities of any company wishing to outsource work.
Secondary Assertion: Securing data is an ongoing process. It requires ongoing compliance with internationally accepted communication standards along with contextual laws like HIPAA to ensure that data transmitted is monitored for compliance. To do this planning an outsourcing company must follow a mature process:
1) Determine the nature of one or more client applications being used. These determinations should be multidimensional and include
2) Develop a data transmission solution. Point to point link or preferred routing.
3) First tier data security : Application level credentials for access.
4) Second tier security : Encrypted channels or packet exchanges.
5) Third tier security : Two factor authentication
6) Limiting access points for data. How to do it and how this helps.
7) Routing and monitoring methods and reports. How TGS implements client and application level real time monitoring and reaction management.
8) Constant auditing of data streams for some applications that require privacy.
9) SLAs metrics and how they affect data security considerations.
10) Project management and implementation steps. How we deploy faster and more reliably than others in this space.
11) Exception escalation and maintaining uptime.
12) Supporting internal and external data security audits.