The primary concern here is to establish the teams, tools, and procedures to be in place and utilized in the event of a security advisory from an equipment vendor, or when an actual attack takes place. The following questions can be used when assessing security issues with providers:
|