Outsourcing & Third-Party Check

Get an evaluation of partner and vendor security policies

Next Steps:


In today’s collaborative business environment, it’s critical that your partners, third-party companies, and outsourced providers enforce information security policies that are consistent with your own rules to prevent intentional or unintentional data loss, network attacks, and threat outbreaks.

Foundstone consultants identify compliance gaps to help ensure that malicious code from hackers and third-party companies does not compromise your network.

Key Benefits

Foundstone’s assessment of your business partners, outsourcing vendors, and other third parties can be driven by specific security requirements and standards defined by your organization. Custom reporting can ensure an efficient workflow for internal teams responsible for processing results of these assessments. Assessments vary based on your needs and relationships with the vendors, and range from security governance reviews and strategic risk assessments to tactical application penetration tests and network assessments.


Foundstone uses the following methodology to complete the Outsourcing & Third-Party Check for your organization:

  • We help identify the companies with which you do business.
  • We review the security policies and procedures of your third-party and outsourced companies.
  • We interview key personnel within your organization.
  • We perform gap analysis based on interviews and the review of policies and procedures.