Sign in to view more content

Create your free account or sign in to continue your search

Welcome back

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

or

New to LinkedIn? Join now

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Top Content
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Mar 20, 2025
  1. All
  2. Engineering
  3. Network Security

A third-party vendor just failed your security audit. What steps should you take next?

What would you do if a vendor failed your security audit? Share your next steps and strategies.

Network Security Network Security

Network Security

+ Follow
Last updated on Mar 20, 2025
  1. All
  2. Engineering
  3. Network Security

A third-party vendor just failed your security audit. What steps should you take next?

What would you do if a vendor failed your security audit? Share your next steps and strategies.

Add your perspective
Help others by sharing more (125 characters min.)
5 answers
  • Contributor profile photo
    Contributor profile photo
    Alexia Wong

    Tuition teacher. Earned Community Top Voice Badge in Teaching in '23 and Community Top Voice Badge in Cybersecurity in '24.

    • Report contribution

    If they failed your security audit, you need to first communicate with them. This is to let them know that they can't meet your expectations and needs. You need to ensure that you keep your organization secured. This is to ensure that it wasn't affected because of this vendor. You need to then look for another reliable vendor. This is to ensure that the vendors wouldn't affect your organization's security. You need to make sure that the contract between you and this first vendor is terminated before getting another one. This is to ensure that there isn't any breach of contract.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Vivek Sharma

    COO & Co-Founder at Sarv.com, Strategic Planner| Technical Advisor| Market Analyst

    • Report contribution

    When a vendor fails a security audit, act swiftly. Assess the risk to determine exposure. Contain threats by limiting vendor access. Engage the vendor for a remediation plan with clear timelines. Enhance controls by adding stricter access management and monitoring. Review contracts to ensure security expectations are enforceable. Implement continuous monitoring and schedule follow-up audits to confirm compliance. Clear communication and proactive management safeguard your data while holding vendors accountable.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Harry Waldron, CPCU

    Associate Consultant @ Voyage Advisory

    • Report contribution

    With many years of internal & external AUDITs, there will always be at least a few recommendation points in their final report. If nothing is published, it's probably not the norm. Still most AUDIT points are either minor or too costly to implement (and company continues to take slight risks). However, if a 3rd party business party completely FAILs the AUDIT with an unsatisfactory status, this must be fully resolved: * Research all findings in depth * Work with internal audit & security experts * Seek any 3rd party plans to rollout improvements * Prioritize most critical needs 1st in vendor interface * Isolate, use VDIs, VPN/MFA and other high security mitigations * Even de-couple automation if completely unsafe (which should be rare)

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Arivukkarasan Raja, PhD

    Director of IT → VP IT | Enterprise Architecture | AI Governance | Digital Operating Models | Reduced tech debt, drove platform innovation | Trusted to align IT strategy with C-suite impact | PhD in Robotics & AI

    • Report contribution

    First, **assess the risk impact** and identify **compliance gaps**. Notify internal stakeholders and **engage the vendor** to address deficiencies. Establish a **remediation plan** with clear timelines and requirements. If critical, **limit access** or pause engagements until issues are resolved. Enhance **contract terms** for stricter security controls. Conduct **follow-up audits** to ensure compliance. Consider alternative vendors if risks remain unmitigated.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Alan Bucio

    PLC, Robot and Vision Programmer | Mechatronics Engineer

    • Report contribution

    Once when I was delivering a project, the audit vendor pointed that somebody could get cut with a window edge. All the edges were covered and then we passed the audit. The lesson here is to pay attention to the minimum detail

    Like
Network Security Network Security

Network Security

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Network Security

No more previous content
  • Your network security is at risk due to an insecure IoT device. How will you prevent a potential data breach?

    10 contributions

  • Your team is accused of a security breach they didn't cause. How do you prove their innocence?

    14 contributions

  • Struggling to explain network security protocols to non-technical colleagues in a remote work setup?

    14 contributions

  • Employees are bypassing VPN protocols in your company. Are your network security measures enough?

    7 contributions

  • Your remote team relies heavily on VPNs. How can you safeguard against potential vulnerabilities?

    13 contributions

  • You're integrating third-party software into your network. How do you mitigate the security risks?

    6 contributions

  • You need to address a diverse audience on network security. How do you make your presentation effective?

    9 contributions

  • Clients are worried about complex access control measures. How do you ease their concerns?

    7 contributions

  • Ensuring robust security is critical for your network. How do you maintain seamless access?

    2 contributions

  • You're facing pushback from your IT team on network security updates. How can you get them on board?

    9 contributions

No more next content
See all

More relevant reading

  • Information Security
    How do you identify security gaps?
  • Systems Management
    How can you ensure all stakeholders understand your system security policies?
  • Information Security
    How do you manage security standards and frameworks?
  • Information Security
    How do you justify security policy exceptions?

Explore Other Skills

  • Programming
  • Web Development
  • Agile Methodologies
  • Machine Learning
  • Software Development
  • Data Engineering
  • Data Analytics
  • Data Science
  • Artificial Intelligence (AI)
  • Cloud Computing

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Your California Privacy Choices
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
5 Contributions