Home / Resources / ISACA Journal / Issues / 2019 / Volume 3 / Access Controls Over Third-Party Applications


Access Controls Over Third-Party Applications

Author: Kathleen Martin, CISA, CRISC, CRVPM Level 2
Date Published: 1, May 2019

With an increasing focus on and potential exposure to confidential data, every organization must take the appropriate precautions to secure customer data, especially when the data are managed by third-party vendor software. Because vendors want to make their product offerings easy to use, they may not focus on industry best practices for user identification and authentication. It is in an organization’s best interest to control and maintain all user access to the software instead of relying on the vendor to perform the administration functions. This is especially significant if the vendor software is processing the organization’s confidential data...


Members, login to keep reading.

Not a member but want to read more?
Explore ISACA member benefits today.

language icon

Journal Translated Articles Are Currently Unavailable

We’re in the process of moving our translated Journal articles to our new platform. Please hold tight—they’ll be available again in mid-February.