1. Home
  2. Training Library
  3. Security
  4. Security Courses
  5. CSSLP Domain 8:5 - Supplier Transitioning

CSSLP Domain 8:5 - Supplier Transitioning

Contents

keyboard_tab
CSSLP Domain 8:5

The course is part of this learning path

Supplier Transitioning
Overview
Difficulty
Beginner
Duration
3m
Students
22
Ratings
3/5
starstarstarstar-borderstar-border
Description

This course covers section five of CSSLP domain 8 and looks at supplier transitioning.

Learning Objectives

  • Learn about correct transitioning processes, intellectual property rights accounting, and the establishment of the final clean baseline

Intended Audience

This course is intended for anyone looking to develop secure software as well as those studying for the CSSLP certification.

Prerequisites

Any experience relating to information security would be advantageous, but not essential. All topics discussed are thoroughly explained and presented in a way allowing the information to be absorbed by everyone, regardless of experience within the security field.

Transcript

So in supplier transitioning, we're going to talk about correct transitioning processes, intellectual property rights accounting, and the establishment of the final clean baseline. Supplier transitioning is the actual movement of code modules and other elements from one member to another in the supply chain. So involved here is a process by which we are going to track all movement and that it's rationalized in such a way that we ensure consistent performance.

The program object's integrity is a known commodity and the safeguard at all transfer points between the various stages in the supply chain. Assurance that points to the points of ingress and egress and the performance of verification and validation with each arrival or departure. And it captures that any exceptions are immediately addressed. Now this will involve a detailed plan covering the movement, the object inspection process itself, item verification validation checking that must be developed to address the exposure and ultimately potential vulnerability of these objects when in motion.

Now in the course of building code repositories, a system of cataloging of all items, no matter how small, should have been designed for tracking and monitoring. Each item will have copyrights associated with it. And these must be recognized as early as possible and tracked to ensure all contractual obligations regarding them are met and the risk of later impacts such as copyrights violations being established that results in stoppages and potentially lawsuits can be effectively mitigated early on rather than dealt with in the courtroom. Additionally, all other intellectual property must be accounted for at as early a stage as possible to protect the interests of each supply chain member, and by extension, each owner of the copyright to the given module. In the end, the result should be a clean sign-off for each and every item, all present and correct, all rights documented as granted, and all contract obligations satisfied for each stage in order to ensure clearly defined and clean baseline.

And so we have come to the end of the final module in the course. Thank you for attending the Cloud Academy's presentation of this very important and highly useful certification. So, from all of us at Cloud Academy, thank you very much.

About the Author
Students
6571
Courses
75
Learning Paths
17

Mr. Leo has been in Information System for 38 years, and an Information Security professional for over 36 years.  He has worked internationally as a Systems Analyst/Engineer, and as a Security and Privacy Consultant.  His past employers include IBM, St. Luke’s Episcopal Hospital, Computer Sciences Corporation, and Rockwell International.  A NASA contractor for 22 years, from 1998 to 2002 he was Director of Security Engineering and Chief Security Architect for Mission Control at the Johnson Space Center.  From 2002 to 2006 Mr. Leo was the Director of Information Systems, and Chief Information Security Officer for the Managed Care Division of the University of Texas Medical Branch in Galveston, Texas.

 

Upon attaining his CISSP license in 1997, Mr. Leo joined ISC2 (a professional role) as Chairman of the Curriculum Development Committee, and served in this role until 2004.   During this time, he formulated and directed the effort that produced what became and remains the standard curriculum used to train CISSP candidates worldwide.  He has maintained his professional standards as a professional educator and has since trained and certified nearly 8500 CISSP candidates since 1998, and nearly 2500 in HIPAA compliance certification since 2004.  Mr. leo is an ISC2 Certified Instructor.

Covered Topics