Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Certified: The CompTIA Security+ Audio Course

Episode 115: Acquisition and Procurement Security (Domain 4)

15 Jun 2025

Description

Security doesn’t start when a system is installed—it begins during the procurement process. In this episode, we examine how secure acquisition strategies reduce long-term risk by vetting vendors, establishing supply chain transparency, and embedding cybersecurity requirements in contracts and service-level agreements (SLAs). We discuss how organizations should assess the security posture of suppliers, request evidence of internal controls or compliance certifications, and evaluate whether vendors follow secure development and patching practices. For hardware, this includes checking firmware integrity, sourcing from trusted distributors, and ensuring devices haven’t been tampered with in transit. For software, it means scrutinizing development environments, dependency management, and licensing concerns that could introduce vulnerabilities or legal risks. Secure procurement lays the foundation for every layer of the security stack that follows—it’s where the risk lifecycle begins, and getting it wrong at this stage can compromise everything that comes after.

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.