Why You Should Publish Your Security Posture Publicly

September 02, 2021

Over the past decade or so, the way InfoSec teams manage data security and privacy standards has changed dramatically. From managing on-premises hardware security access to the online-driven security efforts of a decade ago, things have become more and more flexible. Today, cloud-based security controls, compliance safeguards, and other risk mitigation efforts are in place to help protect customer and proprietary data from malicious threats. So why would you want to tell those threats publicly how you’re going to stop them?

 

What publishing a security posture actually means

First and foremost, publishing your security posture does not mean sharing your entire catalogue of risk controls down to the wire for anyone to see. It typically consists of a list of industry-leading standards that your team is compliant with. This also means that if you do list a standard in your security posture, you most likely already have the answers to the associated questionnaire ready and available for a vendor. 

 

Why you should publish your security posture publicly

 Here are some reasons you should be publishing your security posture publicly:

1. It can establish your team as a security leader in your space. 

By discussing data security and making a conscious effort to post your posture for vendors, customers, and partners to see, your team is making it clear that you realize the importance of data security and are going to do whatever it takes to prevent a breach.

2. It can help speed up inbound questionnaire requests. 

When potential vendors can access at least the start of your security profile before the official vendor assessment process kicks off, they can do some of the preliminary heavy lifting for you, which can speed up the questionnaire process.


VSTHSCD_eBook Blog@3x

Read Our New eBook: Vendor Security That Helps Sales Close Deals Faster

In this ebook, we'll help you get your bearings in this increasingly complex ecosystem. And give you tips for navigating vendor assessment requests that don't slow down the sales process.

Download Now

 

3. It gives potential vendors a place to start to see if a partnership would be compliant. 

Instead of getting halfway through a vendor assessment to realize your security controls are not compliant, any potential vendors can do preliminary due diligence to ensure a vendor partnership is mutually beneficial and possible.

4. It gives your internal sales and/or procurement teams a place to point inbound questions before coming to your team. 

And, finally, publishing your security posture publicly will give your internal sales and/or procurement teams a place to point questions about InfoSec efforts without looping in your team, giving you the space to focus on more critical efforts.

 

Do more with Whistic

By publishing your security posture for potential partners and vendors to access, you will be inviting more requests for questionnaires. With Whistic, your team can easily track and manage inbound vendor requests without having to hassle with emails and spreadsheets. Plus, just one edit to your Whistic Security Profile can update all of your published security controls wherever they are linked to your Whistic profile. You can learn more about how Whistic is making it easy to succeed in the modern world of vendor risk management here.

vendor risk management vendor assessment security profile cloud security vendor security management

About the author

Whistic
Whistic

The latest insights and updates on information security and third party risk management.

Hate security reviews?
Want FREE AirPods?*

Offer valid for any decision-maker/influencer in relation to your company’s third-party risk management strategy. Company size must exceed 100 employees. Exclusions apply. Limit 1 pair per company.

Close