{"id":2473,"date":"2003-11-30T00:00:00","date_gmt":"2003-11-30T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/30\/foreign-firms-must-toe-us-security-line\/"},"modified":"2021-12-30T11:41:24","modified_gmt":"2021-12-30T11:41:24","slug":"foreign-firms-must-toe-us-security-line","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/30\/foreign-firms-must-toe-us-security-line\/","title":{"rendered":"Foreign firms must toe US security line"},"content":{"rendered":"<p>Non-US companies working on US defence and government contracts will soon have to demonstrate the security of their computer systems to meet guidelines issued by the US Customs and Border Protection (CBP) department.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The &#8216;Foreign Manufacturer Security Recommendations Customs-Trade Partnership Against Terrorism (C-TPAT)&#8217;, has been drawn up in the wake of the increased threat of terrorism.  It will be implemented in a phased approach to foreign companies, with Mexican manufacturers being the first to fall under the rules.  Within 90 days of signing the C-TPAT Agreement for Foreign Manufacturers, companies will have to provide an executive summary outlining the elements of the security procedures they have in place.<\/p>\n<p>At a minimum, non-US companies must demonstrate they have information security controls proving the integrity of automated systems, and a process established for reporting and correcting problems.  Pringle believes that C-TPAT will become an external business driver to speed up good security practice and companies that comply with BS7799, the British standard for information security management, will have a good framework in place as a starting point.<\/p>\n<p>He said important security standards for systems include &#8216;having up-to-date anti-virus protection and firewalls that are properly configured.  &#8216;Companies should also carry out penetration tests.&#8217;<\/p>\n<p>More info: [url=http:\/\/www.vnunet.com\/News\/1150526]http:\/\/www.vnunet.com\/News\/1150526[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-2473","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2473"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2473\/revisions"}],"predecessor-version":[{"id":4960,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2473\/revisions\/4960"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}