Third-party Risk Assessment - CompTIA Security+ SY0-701 - 5.3

Professor Messer
11 Dec 202311:36

Summary

TLDRThe video script emphasizes the importance of third-party risk analysis in organizational data sharing. It discusses the necessity of including risk assessment in contracts, conducting penetration tests, and setting clear rules of engagement. The script also highlights the value of regular audits, supply chain analysis, and independent assessments to ensure security. It warns of conflicts of interest and stresses the need for ongoing vendor monitoring and due diligence.

Takeaways

  • 🀝 Organizations often share data with third-party vendors, necessitating risk analysis and data protection measures.
  • πŸ“‹ Including risk assessment information in contracts with third parties ensures mutual understanding of expectations and consequences of breaches.
  • πŸ›‘ Penetration testing is a proactive approach to exploit and identify vulnerabilities in systems or applications, often required by internal policy or contract.
  • πŸ“ Rules of engagement in penetration testing define the scope, parameters, and emergency procedures for the test to ensure controlled evaluation.
  • πŸ”’ Regular audits of third-party vendors are crucial to verify the security measures in place and to ensure they meet the organization's standards.
  • πŸ“œ The 'right to audit' clause in contracts formalizes the expectation of regular security audits by the organization.
  • πŸ”„ Supply chain analysis is vital for understanding and mitigating security risks throughout the entire process from raw materials to final product.
  • πŸ’‘ Independent assessments by knowledgeable third parties can provide fresh insights and a broader perspective on an organization's security.
  • πŸ•΅οΈβ€β™‚οΈ Due diligence is essential before engaging with a third party to verify their claims and investigate potential conflicts of interest.
  • πŸ”„ Ongoing monitoring of third-party relationships is crucial for maintaining IT security and assessing the financial health and reputation of the vendor.
  • ❓ Vendor questionnaires are a simple yet effective method for gathering information about a vendor's business practices and security measures.

Q & A

  • Why is it important for organizations to perform a risk analysis of third parties they work with?

    -It is important because when sharing data with third parties, there is a risk of data exposure or misuse. A risk analysis helps understand how data is handled and protected by the third party, ensuring the security of the company's information.

  • What is the purpose of including risk assessment information in a contract with a third party?

    -Including risk assessment in a contract ensures that both parties understand the expectations regarding data security, and it sets penalties for breaches of the agreement, thus providing a formal framework for managing risks associated with third-party relationships.

  • What is penetration testing, and how does it differ from a vulnerability scan?

    -Penetration testing is an active process of exploiting vulnerabilities in an operating system or application, similar to a vulnerability scan but goes further by attempting to exploit the vulnerabilities. It helps in understanding the real-world impact of potential security weaknesses.

  • Can you explain the role of a third-party company in performing penetration tests?

    -A third-party company specializing in penetration testing can provide an unbiased assessment of security by executing tests over a standard interval of time. They create reports showing the effectiveness of security measures, ensuring both the client and the vendor have a clear understanding of the security status.

  • What is the significance of a 'rules of engagement' document in penetration testing?

    -The 'rules of engagement' document sets the parameters for the test, defining the scope, the devices to be tested, the conditions under which the test will occur, and how any sensitive information discovered during the test should be handled, ensuring all parties are clear on the test boundaries and expectations.

  • Why is it recommended to perform regular audits of third-party vendors?

    -Regular audits ensure that the security measures of the third-party vendors are up to date and functioning as expected. They provide insights into the security controls protecting the company's information and help identify areas for improvement over time.

  • What is the 'right to audit' clause in a contract, and why is it important?

    -The 'right to audit' clause formalizes the expectation of regular security audits within the contract. It ensures transparency and accountability, allowing the company to verify that the vendor's security controls meet the agreed-upon standards.

  • What is a supply chain analysis, and why is it crucial for understanding security concerns?

    -A supply chain analysis examines the entire process from raw materials to the final product creation, identifying potential security risks at each step. It is crucial for understanding where vulnerabilities may exist and for implementing measures to mitigate those risks across the supply chain.

  • Can you provide an example of a real-world incident involving supply chain security concerns?

    -The SolarWinds incident between March and June 2020 is an example where a third-party software update unknowingly installed malware into the networks of their customers, demonstrating the real-world implications of supply chain security vulnerabilities.

  • What are independent assessments, and how can they benefit an organization's security?

    -Independent assessments are evaluations conducted by a knowledgeable third party outside the organization. They provide a different perspective and can reveal insights and best practices gathered from various organizations, potentially identifying security considerations that the organization may have overlooked.

  • What is due diligence, and how does it apply to third-party relationships?

    -Due diligence is the process of investigating and verifying information about a company before entering into a business relationship. It may involve financial checks, background checks, and interviews to ensure the third party is trustworthy and reliable, reducing the risk of security breaches or other issues.

  • What are conflicts of interest, and why are they important to identify in third-party relationships?

    -Conflicts of interest are situations that might compromise the judgment in a business relationship, such as a third party doing business with a competitor or offering gifts for contract signing. Identifying these conflicts is important to maintain the integrity and security of the business relationship.

  • How can organizations monitor their relationships with third-party vendors effectively?

    -Organizations can monitor third-party relationships through regular financial health checks, IT security reviews, and by staying informed about news and social media related to the vendor. Additionally, sending questionnaires to gather information about the vendor's business practices and security measures can provide valuable insights for ongoing risk management.

Outlines

00:00

πŸ”’ Third-Party Risk Analysis and Contractual Safeguards

The first paragraph emphasizes the importance of performing a risk analysis for third-party vendors with whom an organization shares sensitive data. It highlights the necessity of including risk assessment details in contracts to ensure mutual understanding of expectations and penalties for breaches. The paragraph introduces penetration testing as a common type of risk assessment, which involves actively exploiting vulnerabilities in systems or applications, and the importance of a 'rules of engagement' document to define the scope and parameters of such tests. It also touches on the role of third-party companies in conducting these tests and the need for regular audits to ensure ongoing security compliance.

05:00

πŸ› οΈ Strengthening Security Through Audits and Supply Chain Analysis

The second paragraph discusses the benefits of conducting regular audits to improve security controls and the process of supply chain analysis to identify potential security risks. It explains that audits should be integrated into contracts and may involve third-party auditors to provide an unbiased perspective. The paragraph also details the SolarWinds malware incident as a real-world example of supply chain security concerns, underscoring the importance of due diligence and independent assessments to enhance an organization's security posture.

10:00

🀝 Vendor Management and Ongoing Relationship Monitoring

The third paragraph focuses on the ongoing management of vendor relationships, including the monitoring of third-party companies to ensure the security and stability of the business partnership. It describes the use of questionnaires to gather information about a vendor's business practices, disaster recovery plans, data storage methods, and security protections. The answers from these questionnaires are used to update the risk analysis and are crucial for maintaining a secure and compliant relationship with third-party vendors.

Mindmap

Keywords

πŸ’‘Vendor

A vendor is a company or individual that provides goods or services to another entity, often in a business-to-business context. In the video's theme, vendors are crucial as they handle sensitive company data, and thus, their security practices are of paramount importance. The script emphasizes the need for risk analysis and contractual agreements with vendors to ensure data protection, as seen in the discussion about payroll services and email marketing services.

πŸ’‘Risk Analysis

Risk analysis is the process of evaluating the potential risks that may impact an organization's data and operations. It is integral to the video's message as it highlights the importance of understanding and mitigating the risks associated with third-party vendors. The script mentions performing a risk analysis to know what happens with the data shared with third parties and how they protect it.

πŸ’‘Penetration Testing

Penetration testing, also known as pen testing, is a simulated cyber attack against a computer system, network, or web application to identify vulnerabilities that an attacker could exploit. The video discusses this as a common type of risk assessment, where the goal is to actively exploit vulnerabilities, and it may be a contractual requirement between an organization and a third party.

πŸ’‘Rules of Engagement

In the context of the video, rules of engagement define the scope and parameters of a penetration test. They ensure that all parties understand the limits and objectives of the test. The script gives examples of what these rules might include, such as the type of test (e.g., on-site physical breach), timing, and emergency contacts.

πŸ’‘Audit

An audit in this context refers to a systematic review and examination of a third party's security practices to ensure they meet certain standards. The video emphasizes regular audits as a means to verify that security controls are up to date and effective. The script mentions integrating the right to audit into contracts and using third-party auditors for an unbiased assessment.

πŸ’‘Supply Chain Analysis

Supply chain analysis involves examining the entire process from raw materials to the final product to identify potential security risks. The video uses the example of the SolarWinds incident to illustrate the real-world implications of supply chain vulnerabilities and the importance of performing such analyses.

πŸ’‘Compliance

Compliance refers to the adherence to regulations, policies, or standards. In the video, it is mentioned that audits may be required based on the type of data stored, which is part of a company's compliance obligations. Compliance is a key driver for implementing security measures and conducting regular audits.

πŸ’‘Conflict of Interest

A conflict of interest arises when a situation might compromise the judgment of one or both parties in a business relationship. The video script provides examples such as a third party doing business with a competitor or offering gifts for contract signing, which could potentially affect the integrity of the business relationship.

πŸ’‘Due Diligence

Due diligence is the process of investigating and verifying information about a company before entering into a business relationship with it. The video script describes due diligence as an essential step in the process of selecting third-party vendors, which may include financial checks, background checks, and interviews.

πŸ’‘Vendor Monitoring

Vendor monitoring involves the ongoing assessment and management of a company's relationship with its third-party vendors, particularly from an IT security perspective. The video script describes various methods of monitoring, such as sending questionnaires to gather information about the vendor's business practices and security measures.

πŸ’‘Security Controls

Security controls are the measures put in place to protect an organization's data and systems. The video script discusses the importance of understanding and improving security controls in the context of third-party relationships, audits, and supply chain analysis to safeguard against potential threats.

Highlights

Organizations often share data with third-party vendors, necessitating risk analysis to understand data protection measures.

Risk assessment information should be included in contracts with third parties to set expectations and penalties for breaches.

Penetration testing is a proactive approach to exploit and identify vulnerabilities in systems or applications.

The rules of engagement document outlines the scope and parameters of penetration tests, including physical breach attempts and internet-based simulations.

Regular audits are crucial for ensuring the security of third-party vendors, often mandated by compliance or conducted by external parties.

Access management, offboarding processes, and password security are key areas reviewed during audits of vendor relationships.

Supply chain analysis is essential for identifying security concerns throughout the process from raw materials to final product.

The SolarWinds incident in 2020 highlighted the real-world impact of supply chain vulnerabilities, affecting major global networks.

Independent assessments from knowledgeable third parties can provide fresh insights and enhance an organization's security posture.

Due diligence is critical before engaging with third parties, including verifying financials, conducting background checks, and assessing potential conflicts of interest.

Continuous monitoring of third-party relationships is vital for maintaining IT security and involves financial health checks and IT security reviews.

Vendor monitoring may include questionnaires to assess due diligence processes, disaster recovery plans, and data storage security methods.

Conflicts of interest, such as business with competitors or familial ties, can compromise business relationships and must be managed.

Quantitative and qualitative monitoring helps in assessing the overall risk associated with third-party vendors.

A dedicated team or individual within an organization is often responsible for managing and monitoring third-party vendor relationships.

The integration of questionnaire responses from third parties into risk analysis helps in dynamically updating the security assessment.

Transcripts

play00:01

Every organization works with vendors of some kind.

play00:05

These might be an organization that provides payroll services.

play00:08

You might have a separate email marketing service that you use.

play00:11

You might have a travel department that's

play00:13

external to your company or maybe

play00:15

you just purchase all of your raw materials

play00:17

from a third party.

play00:18

With all of these relationships, some part of the company's data

play00:23

is shared with that third party.

play00:25

Some of this data may be relatively unimportant.

play00:27

But if you're sharing information

play00:29

with a payroll company, you're giving

play00:31

a lot of your company's information

play00:33

into the hands of a third party.

play00:35

For that reason, it's always a good idea

play00:37

to perform a risk analysis of the third party

play00:40

to know exactly what's happening with your data

play00:43

and how they're protecting the information that you're

play00:45

providing to them.

play00:47

Because you're working with a party that

play00:48

is external to your company, it's

play00:50

always a good idea to put the risk assessment

play00:53

information into the contract that you

play00:55

have with that organization.

play00:57

This ensures that everyone understands the expectations

play01:00

for this risk assessment.

play01:01

And it also sets penalties if any part of that agreement

play01:05

breached.

play01:07

One common type of risk assessment

play01:09

is penetration testing.

play01:10

This is very similar to performing a vulnerability

play01:13

scan, except we're trying to actively exploit

play01:16

the vulnerabilities that might exist in an operating

play01:18

system or an application.

play01:20

This might be a requirement you set internally to your company,

play01:24

or it might be a mandate that is written

play01:26

into the contract between you and a third party.

play01:29

For example, this could require that yourself

play01:31

and the third party execute penetration tests

play01:34

over a standard interval of time.

play01:36

And this might involve a third party company that specializes

play01:40

in penetration testing.

play01:42

That way, you and your vendor are both using this third party

play01:46

to create reports showing what type of security is in place

play01:50

and how well that security is working.

play01:53

Most penetration tests also include a document

play01:56

called the rules of engagement.

play01:58

This sets the parameters so that everybody understands

play02:01

the scope of the test and exactly what devices

play02:04

will be tested.

play02:05

For example, the rules of engagement

play02:07

might say that this is an on-site physical breach test.

play02:10

So someone will be attempting to gain access to your facility.

play02:13

Or it might be a test that's handled internally

play02:16

inside of your company.

play02:18

Or it might be a test that's done across the internet

play02:20

to simulate someone who's on the outside.

play02:23

We can also set parameters around when

play02:25

the test will occur.

play02:26

This might be on a particular date and time.

play02:29

Or you may specify that it's only

play02:31

to take place during normal working hours or perhaps only

play02:34

after working hours are over.

play02:36

And most rules of engagement will

play02:38

include information such as the IP address ranges

play02:41

that will be tested, any emergency contacts, which

play02:44

may be very important if something

play02:45

goes wrong during the test.

play02:47

You might also want to specify how the third party should

play02:50

handle any sensitive information that they

play02:52

might happen to come across during this penetration test.

play02:55

And you may set specific parameters

play02:57

around which devices are in scope during the test

play03:01

and which devices are out of scope

play03:03

and should not be touched during this process.

play03:06

When you're working in partnership with a third party

play03:09

vendor, you're commonly going to share some type of data

play03:12

between the organizations.

play03:14

This is especially true if you use a third party for payroll

play03:18

or some other type of third party service

play03:20

or if you're outsourcing part of your organization's functions

play03:23

to a third party.

play03:24

It may be that this third party is holding and managing all

play03:28

of the data in their facility.

play03:30

Or it may be something like an internet provider, where

play03:32

all of your internet traffic traverses that company's links.

play03:36

For those reasons, it might be a good idea

play03:38

to perform regular audits to ensure

play03:40

that all of their security is up to date and working

play03:43

as expected.

play03:45

Normally, we would integrate this requirement

play03:47

into the contract itself into a clause called the right

play03:50

to audit.

play03:51

This means that everyone understands

play03:53

that regular audits will occur.

play03:55

And this might even set parameters for that audit

play03:58

and how they can be handled.

play03:59

This allows both sides to understand

play04:01

what type of security controls are in place

play04:04

and how those controls are used to protect the company's

play04:06

information.

play04:08

In many cases, neither yourself nor the vendors

play04:11

you're working with are the ones performing the audit.

play04:14

It's very common to have a third party come in

play04:17

and perform the audit as someone who's

play04:19

outside the scope of the contract.

play04:21

Sometimes, these audits are required

play04:23

based on the type of data that's stored.

play04:25

And it may be part of your company's compliance

play04:27

to make sure that an audit occurs.

play04:29

But even if there isn't a specific compliance need,

play04:32

it's always a good idea to perform regular audits.

play04:36

From a security perspective, these audits

play04:38

are focusing on all of the security controls

play04:40

surrounding the relationship between yourself

play04:43

and your vendors.

play04:44

For example, you may want to look

play04:46

into access management, any offboarding

play04:48

processes and procedures, what type of security

play04:51

is associated with passwords?

play04:53

And how are those passwords stored?

play04:55

And what type of controls are in place to allow or disallow

play04:58

access to the VPN?

play05:00

There are almost always opportunities

play05:02

to improve the security controls that are in place.

play05:04

And once you perform an audit, you'll

play05:06

have documentation that shows exactly what security

play05:09

controls might be improved to provide additional security.

play05:13

And most vendor relationships are

play05:15

going to be over an extended period of time.

play05:17

So you want to not only perform a single audit,

play05:20

but you'll want to have continued audits perhaps

play05:23

occurring at regular intervals.

play05:26

The supply chain describes the entire process

play05:28

that occurs from the beginning with the raw materials

play05:32

all the way until a final product is created.

play05:34

And there are security concerns that

play05:36

take place through every step of the supply chain process.

play05:40

This is why it's often a good idea to perform a supply chain

play05:43

analysis.

play05:44

This will give you a chance to understand

play05:46

the entire process and where security concerns may lie.

play05:50

There are a number of different steps

play05:52

that you can follow to understand how the security

play05:55

might be for your supply chain.

play05:56

You might want to start with understanding

play05:58

how we get a product or service from the vendor

play06:01

to the customer.

play06:02

We could also evaluate how different groups are

play06:05

coordinated between both of the organizations

play06:08

and understand where there might be areas where you

play06:11

can improve that communication.

play06:12

At the technical level, you'll want

play06:14

to understand how the security is handled between the two

play06:17

teams at your organization and the third party vendor.

play06:20

And you'll want to document any changes

play06:22

to the business process that occur between yourself

play06:25

and the vendor.

play06:26

The security concerns for the supply chain are very real.

play06:29

A good example of this occurred between March and June of 2020

play06:34

when a software update from a third party

play06:36

installed malware into all of their customers' networks.

play06:40

This was announced in December, 2020 by the company SolarWinds.

play06:45

An attacker was able to breach the SolarWinds network,

play06:48

install malware into the code of the product,

play06:51

and then SolarWinds deployed that malware update

play06:54

with a valid SolarWinds digital signature.

play06:58

This update was installed into some of the largest

play07:00

networks in the world.

play07:01

And it's estimated that out of the 300,000 customers that

play07:05

could have been impacted by this, at least 18,000 of them

play07:09

had this malware installed as part of this update.

play07:12

It's now very possible that the 300,000 customers are now

play07:16

reevaluating the process they use for supply chain analysis.

play07:21

When you're working for an organization,

play07:22

your scope tends to be very focused

play07:24

on the processes and procedures for that single organization.

play07:28

For that reason, it might be valuable to bring

play07:31

in someone from the outside who has a different perspective.

play07:34

These independent assessments might provide you

play07:37

with a different perspective that you're not

play07:39

able to get from inside of your own organization.

play07:42

If you find a knowledgeable third party

play07:44

to perform these assessments, they

play07:46

can provide you with interesting insights

play07:48

that they're able to gather across

play07:50

many different organizations.

play07:52

And that broad scope of understanding

play07:54

may provide you with an increased level of security

play07:57

for your organization.

play07:58

And if you're bringing in a knowledgeable third party,

play08:01

you may be able to receive insights into your security

play08:04

that you simply weren't considering.

play08:06

Before bringing a third party organization into your company,

play08:10

you may hear other people mention that they're

play08:12

performing due diligence.

play08:14

This describes the process of investigating and getting

play08:17

more information about a company before you decide

play08:20

to do business with them.

play08:21

This might involve investigating and verifying information

play08:24

that the company has provided.

play08:26

For example, they might say that they've

play08:27

made a certain amount of money over the last few years,

play08:30

and they have a certain number of customers.

play08:32

This might also include background checks or interviews

play08:35

with individuals in that third party organization.

play08:38

It's very important when working with a third party

play08:41

that you maintain a business relationship.

play08:43

But there are times when there might

play08:45

be a conflict of interest.

play08:47

This means that there is something

play08:49

that might compromise the judgment on either side

play08:52

of the business relationship.

play08:54

For example, you may find out that a potential third party

play08:57

that you would like to work with is also doing business

play09:00

with your largest competitor.

play09:02

Or you might find out that this third party

play09:04

company employs a relative of one of your executives.

play09:07

And another conflict of interest might be that the third party

play09:10

company is offering gifts if the contract between the two

play09:14

organizations is signed.

play09:16

All of these situations are clear conflicts of interest.

play09:19

And it may prevent the two companies

play09:21

from doing business with each other.

play09:23

Once the contract is signed, the work is really just beginning.

play09:26

Not only are you entering to a business relationship

play09:29

with this third party, you'll also

play09:31

want to have continued monitoring of the relationship

play09:34

between the two companies, especially from the perspective

play09:37

of IT security.

play09:39

It's very common to have these monitoring processes occur

play09:42

rather frequently so you can perform financial health

play09:45

checks, perform IT security reviews,

play09:48

and it might be a good idea to monitor the news

play09:50

to see what type of articles or social media posts

play09:54

might be associated with this partner.

play09:57

A company will often have relationships

play09:58

with many third parties.

play10:00

And the monitoring that you perform

play10:02

with each of those companies may be slightly different.

play10:05

It might be useful to have both quantitative and qualitative

play10:08

monitoring for all of your vendors.

play10:10

This often means that there is an individual or group

play10:14

of individuals within your organization

play10:16

that are responsible for the relationship

play10:18

between your company and the third party.

play10:20

And this group within your company

play10:22

would therefore be responsible for performing the vendor

play10:26

monitoring.

play10:27

One very common way to perform this vendor monitoring

play10:30

is to send over a questionnaire to the third party.

play10:32

This questionnaire is a relatively simple way

play10:35

to find out more information about the way the vendor does

play10:38

business.

play10:38

For example, you may want to know

play10:40

what the vendors due diligence process looks like

play10:43

and what they do to prevent any type of conflicts.

play10:46

Or perhaps you want to know what plans the vendor might

play10:48

have for disaster recovery.

play10:50

If something happens to the vendors facility,

play10:53

how will they stay up and running

play10:54

to be able to support you?

play10:56

At a technical level, you might want

play10:58

to know what type of storage method

play11:00

is used to store your data and how is that data protected.

play11:03

All of these questionnaires can help you understand more

play11:06

about the security at that vendor site

play11:09

and may allow you to recommend or change some of the ways

play11:12

those processes and procedures are handled in the future.

play11:15

The answers you receive from that third party

play11:17

are integrated into the risk analysis for that vendor.

play11:21

And they are constantly updated throughout the relationship

play11:24

with that third party.

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Vendor RiskData SecurityRisk AnalysisPenetration TestingContract TermsCyber ProtectionAudit RightsSupply ChainDue DiligenceThird-Party Audits