To handle security requirements for third-party managed infrastructure, follow these steps:
1. **Security Reports and Certifications**: Request and review security reports or certifications from the provider, such as penetration test reports or compliance certifications (e.g., ISO27001, SOC 2, PCI DSS).
2. **TLS/SSL Configuration**: Ensure the infrastructure supports secure protocols like TLS 1.2 or higher. If older versions (e.g., TLS 1.0 or 1.1) are in use, request an upgrade.
3. **Data Sharing and Storage**: Disclose any data sharing with the provider, ensure sensitive data is stored securely, and confirm compliance with regulations.
4. **Vulnerability Management**: Verify that the provider has a robust vulnerability management program, including regular updates and patches.
5. **Custom Settings**: For sensitive data in custom settings, set visibility to "Protected" instead of "Public." If changes aren't possible, create new protected settings and update references.
6. **Documentation**: Maintain detailed documentation, including architecture diagrams, data flows, and security controls.
7. **False Positives**: Justify any flagged security findings as false positives in a False Positive document during the security review.
8. **Communication**: Work with the provider to address flagged vulnerabilities and ensure compliance with security requirements.
These steps will help ensure the third-party infrastructure meets security standards and mitigates risks.