What Does Your Software Vetting Process Look Like?

0
13
Asked By TechieTurtle92 On

I'm curious to know how other companies handle their software vetting processes. At my company, we have a change control board and we scan all software requests with VirusTotal. Then we install the software on an airgapped sandbox PC and run a Defender Virus scan. We're looking to improve our process and would love to hear any tips, tricks, or additional steps you all take to ensure software security, especially if you handle this in a cloud-integrated environment!

5 Answers

Answered By RiskyBusiness77 On

It's essential to tailor your vetting process to your threat level and risk tolerance. If you're using an air-gapped PC, you likely face a sophisticated threat environment. Solutions like Cross Domain Solutions offer profound protection, but they can be pricey. There are middle-ground options like Glasswall for deep content inspection that might suit your needs without breaking the bank.

Answered By MalwareHunter23 On

It’s important to remember that some malware can detect if it's running in a VM or sandbox. We make sure to run scans with VirusTotal and conduct full Defender scans on the installed software, but we also need tools specifically for detecting those tricky cases.

Answered By SecuritySquirrel44 On

It can be a challenge when non-IT people decide they need a specific software package and just buy it without consulting us. It's even more frustrating when simple issues could be resolved by reading the manual! I've implemented a cyber security policy that allows me to refuse requests and ensures I’m not held accountable for unsupported software installations.

Answered By CloudGuru88 On

When it comes to cloud-integrated software, I focus on checking the EULA and licensing terms to make sure we're compliant. If it’s way over my head, I pass it up the chain. If the software isn’t available through official channels, we usually deny it unless there are significant reasons to consider it.

Answered By VetItOut91 On

Yes, we've developed a process for both approvals and refusals to limit the number of apps we end up having to support. We review existing software regularly and remove any unsupported or end-of-life options. Our configuration management log keeps track of all software requests, whether they're approved or rejected.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.