833-847-3280
Schedule a Call

New Cybersecurity Guidelines for CTPAT Members

CTPAT

Earlier this year, Customs Trade Partnership Against Terrorism (CTPAT) released guidelines for minimum security criteria to be used by CTPAT members.  This includes physical security as well as cybersecurity.

What is CTPAT

CTPAT is open to members of the trade community who demonstrate that their security practices are in place and who have not had any significant security events.  It is a voluntary program, and the trade community consists of exporters, importers, carriers, foreign manufacturers, and more.

CTPAT Guidelines

Some of the new guidelines for security practices include written policies and procedures. Additionally, installation of specific safeguards, and regular testing of the security of their IT infrastructure.  Many of the policies and procedures requirements and safeguards can be reviewed through a security risk assessment.  This assessment would determine things like identifying unauthorized users and user access restrictions based on job roles. As well as, individual accounts for each person, and remote access if applicable.  All of these are requirements based on the CTPAT Minimum Security Criteria.

The other requirement of regularly testing the security of the IT infrastructure can be done with network penetration testing. CTPAT states that a “secure computer network is of paramount importance to a business, and ensuring that it is protected requires testing on a regular basis.” Scheduling vulnerability scans can achieve this.

Vulnerability Scanning

Vulnerability scanning is not the same as penetration testing. It is an automated process that only detects the known vulnerabilities within a network environment. This does not include the manual labor of verifying false positives or detecting default credentials on a firewall or server. Penetration testing uses the extra leverage of a vulnerability scan to try and identify a hole by which a malicious user can gain access into the network. Therefore, this is why network penetration testing is so important within a company. MainNerve utilizes ethical hackers to act as malicious users to scour and detect holes within the network that can be easily hacked.

As attacks become more sophisticated, a vulnerability scan may not be enough to tell if you have significant security flaws or vulnerabilities.  To learn more about the differences between penetration testing and vulnerability scanning, check out our post.

How We Can Help

At MainNerve, we highly suggest conducting a penetration test annually.  We can perform vulnerability scans quarterly or six months after the penetration test to help ensure that there are fewer vulnerabilities throughout the year.

Without a doubt, we understand it can be difficult to justify spending money on a penetration test if you haven’t already been doing so, the benefits surely outweigh cost of a hack.  In short, being proactive ($) is always better than being reactive ($$$$).  Contact MainNerve for one of our sample reports. You can see what type of findings are in your network.  That way you can be sure to meet all the CTPAT security criteria.

Latest Posts

A transparent image used for creating empty spaces in columns
When clients schedule an internal network penetration test, one of the first questions we hear is some version of: “Can you do it after hours so it doesn’t disrupt anything?” It’s a reasonable instinct. The idea is that running a security test while employees are…
A transparent image used for creating empty spaces in columns
When something goes wrong with the internet connection, a printer won’t connect, or a new employee needs their laptop set up, you call your IT person. They fix it. Problem solved. It’s one of the more satisfying parts of running a business: having someone who…
A transparent image used for creating empty spaces in columns
There’s a story most small business owners tell themselves about cybersecurity. It goes something like this: hackers are out there targeting banks, hospitals, and major corporations. They’re after the big scores, millions of records, massive ransom payments, headline-grabbing breaches. A small business with 20 employees…
A transparent image used for creating empty spaces in columns
If you’ve purchased a cyber insurance policy, you’ve probably done something most small business owners haven’t. You recognized that a cyberattack is a real business risk, you did something about it, and now you have a document that says you’re covered. That peace of mind…
A transparent image used for creating empty spaces in columns
Let’s be honest about something that doesn’t get said often enough in polite compliance conversations: the healthcare industry has been getting away with inadequate data security for a very long time. Patients hand over their most sensitive personal information every time they walk through a…
A transparent image used for creating empty spaces in columns
Most small business owners think about a data breach the same way they think about a house fire. They know it happens to people. They know it would be bad. They assume it probably won’t happen to them, and even if it did, their insurance…
contact

Our Team

This field is for validation purposes and should be left unchanged.
Name(Required)
On Load
Where? .serviceMM
What? Mega Menu: Services