Best Practices and Recommendations for Cybersecurity Service Providers

3Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This chapter outlines some concrete best practices and recommendations for cybersecurity service providers, with a focus on data sharing, data protection and penetration testing. Based on a brief outline of dilemmas that cybersecurity service providers may experience in their daily operations, it discusses data handling policies and practices of cybersecurity vendors along the following five topics: customer data handling; information about breaches; threat intelligence; vulnerability-related information; and data involved when collaborating with peers, CERTs, cybersecurity research groups, etc. There is, furthermore, a discussion of specific issues of penetration testing such as customer recruitment and execution as well as the supervision and governance of penetration testing. The chapter closes with some general recommendations regarding improving the ethical decision-making procedures of private cybersecurity service providers.

Cite

CITATION STYLE

APA

Kirichenko, A., Christen, M., Grunow, F., & Herrmann, D. (2020). Best Practices and Recommendations for Cybersecurity Service Providers. In International Library of Ethics, Law and Technology (Vol. 21, pp. 299–316). Springer Science and Business Media B.V. https://doi.org/10.1007/978-3-030-29053-5_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free