Security due diligence before installing a new software in a computer

Preparation

Vendor Evaluation

Software Assessment

Security Features

Data Protection

Vulnerability Management

Compliance and Regulation

Deployment and Integration

Training and Support

Risk Assessment

Documentation and Contracts

Testing and Proof of Concept

Final Decision and Implementation

Related Checklists