Why "Yes" or "No" approach to vendor security risk assessment is pointless.
Mobolaji "Manny" Moyosore
Founder and CEO | Practice Lead | Executive | Career Coach
According to SecurityScorecard and The Cyentia Institute, 98% of organizations have a relationship with at least one third party that has experienced a breach in the last two years.
In today’s business world, no organization can survive without relying on business partners to extend its capabilities. However, with service providers getting hit by cybercriminals everyday, making sure that your suppliers understand the potential impact of a cyber attack on their business and the businesses of their customers (including your organization), and implement appropriate mitigations, is a business imperative.
A lot of organizations know this and they conduct vendor due diligence assessments (mostly via questionnaires only) before establishing relationships with suppliers. On the surface, this can be said to be “better than nothing”, but in reality, it is nothing more than a box-ticking exercise for most organizations. On one hand, the time spent conducting this exercise can be better spent to achieve more meaningful business outcomes while on the other hand, yeses by vendors are more likely to lull outsourcing organizations into a false sense of security.
There’s a saying that “no security at all is better than a false sense of it.” If you have no security at all, at least you know and accept that something bad could happen at any time due to your inaction.
Most outsourcing companies end up spending so much time asking questions that are of little value while making their prospective vendors burn productive hours answering these questions. For instance, the Shared Assessments' Standardized Information Gathering (SIG) tool is commonly used in its default form to obtain responses to security questions from vendors. This tool, which employs industry best practices for gathering and assessing 19 domains of risk, serves as the “trust” component (of “trust but verify”) for outsourcers who wish to use industry-vetted questions on a service provider’s security controls.
The SIG tool comes in two forms: SIG lite and SIG core. The former, which contains 126 questions, is commonly used to assess low-risk vendors or as a preliminary assessment tool during RFI stage while the latter, which contains 855 questions, is used in more detailed assessment to evaluate the security arrangements of organizations who store or manage regulated information.
Now, given that the SIG tool only serves as the “trust” component of the “trust but verify” mantra, while spend so much time on this trust component and little or no time on the verify part? In a rapidly evolving cyber threat, technology and regulatory world, it is unrealistic to expect maximum value out of a burdensome process of dealing with several hundreds of questions while assessing a vendor. This burden is as heavy on the internal security team as it is on the vendor’s side. A paradigm shift is needed!
Lessons from real data breaches
Let’s look at two cases where failure of certain suppliers to implement appropriate security controls led to negative business outcomes for their customers.
How Overby-Seawell cost KeyBank more than $5 million in damages
When KeyBank lost the personal data of its consumers to cybercriminals in July 2022, it was primarily due to the failure of Overby-Seawell, its key supplier, to design and implement appropriate safeguards around the collection and maintenance of highly sensitive and confidential mortgage information. This breach, which ended up costing KeyBank in excess of $5 million in damages, is a reminder of how a third party supplier can introduce a security weaknesses into an organization’s cyber defense chain.
It is difficult to tell whether KeyBank had a vendor risk management function in place prior to this data breach, but it is fair to assume that one of the biggest 25 banks in the US would have conducted some sort of due diligence on a prospective key supplier before establishing business relationship.
Typically some of the questions asked during such due diligence exercise would have been similar to the following:
a. Are security controls for handling personally identifiable information applied?
领英推荐
b. Is personally identifiable information handled in accordance with relevant legislation throughout its lifecycle?
c. Does the organization assess the impact of business information being disclosed to unauthorized individuals?
If KeyBank had asked these questions in the course of a vendor due diligence exercise and Overby-Seawell had responded “yes” to them all, then what? These are all great questions, but most of the time, the organization conducting the assessment does very little by way of validating the existence and/or effectiveness of relevant security controls.
How attack against a fourth-party vendor can be a problem
When Healthcare giant, Highmark Health, was held responsible for leaking healthcare data of over 60,000 individuals in March 2022, it was as a direct result of its relationship with WebbMason, its provider of marketing services. However, the attackers did not get that data directly from WebbMason. Instead, they targeted Quantum Group, a printing and mailing services provider used by WebbMason. The files accessed by the hackers related to provider mailings regarding prescription drug changes, including names, birth dates, Highmark member IDs, and prescription information.
While we may not know anything about the level of due diligence conducted by Highmark Health on WebbMason, and by WebbMason on Quantum Group, one can argue that Highmark Health may not have anticipated that a vendor of its vendor could be responsible for a major breach of its consumers' healthcare data.
How many organizations ask questions about the information security arrangements of the key suppliers of their prospective vendors? How are the answers to those questions validated?
While conducting vendor risk assessments, organizations who control regulated data need to remember that they also have the duty of due care in addition to their duty of due diligence. For instance, under the EU General Data Protection Regulation (GDPR), a data controller (entity in control of data processing) and a data processor (any third party that works on behalf of the data controller) have different levels of compliance obligations.
Although these entities should still take appropriate organizational and technical measures to ensure that any processed data is done so in line with the GDPR. Should a data breach occur, the regulatory hammer will come down heavier on the data controller than it will on the data processor because the controller hires the processor, and so have the overall say and control over the reason and purposes behind data collection and the means and method of any data processing.
One of the key lessons to be learned from the Highmark Health breach is that organizations need to be aware of the information security arrangements of the sub-processors (e.g., Quantum Group) leveraged by the entities working on their behalf (e.g., WebbMason) to process personal data of their consumers. If you ask your vendor the right question about their key supplier and demand proof, you’re essentially telling them where to go get the answers from. If the answer or proof is not satisfactory, then you have a risk treatment decision to make.
So what should organizations do to cover their bases when it comes to vendor risk assessment? Below are five important things to bear in mind when assessing the risk posed to your business by a vendor:
The foregoing list is not exhaustive but it's a very good start. The cyber threat, regulatory and technology environments have evolved beyond the days of questionnaires that lack any distinguishing characteristics. Your vendors are capable of allowing cyber adversaries into your network through the backdoor. Help them shut the door by complementing your duty of due diligence with that of due care.
Manager | Cybersecurity & GRC Strategy, Implementations, Operations | MBA, CISSP, CISM, CISA, CRISC, ITIL, PMP
1 年An engaging and informative read. Thank you, Manny.