This chapter outlines some concrete best practices and recommendations for cybersecurity service providers, with a focus on data sharing, data protection and penetration testing. Based on a brief outline of dilemmas that cybersecurity service providers may experience in their daily operations, it discusses data handling policies and practices of cybersecurity vendors along the following five topics: customer data handling; information about breaches; threat intelligence; vulnerability-related information; and data involved when collaborating with peers, CERTs, cybersecurity research groups, etc. There is, furthermore, a discussion of specific issues of penetration testing such as customer recruitment and execution as well as the supervision and governance of penetration testing. The chapter closes with some general recommendations regarding improving the ethical decision-making procedures of private cybersecurity service providers.
CITATION STYLE
Kirichenko, A., Christen, M., Grunow, F., & Herrmann, D. (2020). Best Practices and Recommendations for Cybersecurity Service Providers. In International Library of Ethics, Law and Technology (Vol. 21, pp. 299–316). Springer Science and Business Media B.V. https://doi.org/10.1007/978-3-030-29053-5_15
Mendeley helps you to discover research relevant for your work.