You are on page 1of 10

The Buyer’s

Guide to
Third Party
Risk
Management
INTRODUCTION

The Extended Vendor Risk


Data Center Solutions
The data center is no longer confined to a The primary risks posed by technology vendors
server room or a switch closet. It extends into are the breach or exposure of sensitive data,
every vendor that handles data and provides and the unplanned interruption of services by a
technological services or infrastructure. technical incident in the vendor’s environment.

Managing the business risk incurred by The same concerns an IT department might have
technology has proven difficult, even when it about a local environment can be extrapolated
was confined to a local data center; with the to vendor infrastructure, so understanding how
sprawling, interdependent ecosystem of modern a vendor handles their security and operations
digital business, the scope and complexity have leads to understanding how likely they are
increased significantly. The need for efficient to suffer a breach, leak, or outage. However,
management of this risk has created a market equally important, is that this understanding can
for vendor assessment and scoring, in which be achieved with a minimum of overhead.
very different solutions compete for the same
With dozens or hundreds of vendors, many
function.
organizations find themselves unable to keep
Understanding your own goals, and what pace with vendor assessments. A vendor risk
solutions need to provide to reach those goals, solution must eliminate this overhead so that
are key to navigating this space. assessment can proceed at scale and with little
specialized knowledge and less manual effort.

The Buyer’s Guide to Third Party Risk Management 2


Businesses
simply have too
many vendors to
assess them all
thoroughly.
S E C U R I T Y R AT I N G S

Why Use Security Ratings?


The technical nature of cyber risk makes it inaccessible to those without advanced skills and knowledge,
leaving organizations without visibility into an extremely valuable and critical part of the business.

Credit scores make debt risk legible, returning an easily understood aggregation of risk assessment efforts
in a standardized, comparable system. Security ratings solve the problem of cyber risk like credit scores:
specialists assess each company using a standardized collection of criteria and proprietary tools, and
return a rating that can be understood in a business context by nontechnical people.

Risk ratings
aren’t magic,
they’re math.

TheBuyer’s
The Buyer’sGuide
GuidetotoThird
ThirdParty
PartyRisk
RiskManagement
Management 4
S E C U R I T Y R AT I N G S

What Makes a Good Rating?


When comparing security ratings, consider the following qualities and how they relate to your risk
management goals:

Threat Focus Business Context

There are many factors that can be used to You might know that A is better than F, or that
determine a security score. But only those a higher number is better than a lower number,
factors that directly relate to the possibility of but unless the risks causing the lower score
breach and outage provide actual assistance in are explained in terms of how they could affect
reducing the likelihood of those incidents. How business, those comparative scores are arbitrary.
the security rating helps address actual threats Security ratings should explain why a low score
should be clearly documented. is risky, in terms of potential loss and damage.

Transparency Continuous Audit

Although the algorithms used to derive the Traditional business assessments follow
score itself are proprietary, the factors that traditional business cadences: annually,
are considered in the score should be clearly quarterly— but cyber risk changes daily, hourly,
laid out. Security ratings aren’t magic, they’re in real time as someone works on a system.
math, and the more a client knows about what a Security ratings should continuously audit the
security rating really measures, the better they vendors they score to always have a current risk
are able to control their vendor risk. analysis and to provide historical trends and
timelines
Internet-Wide Score Database
Remediation Tracking
Every digital business has an internet footprint.
Monitoring a small subset of these businesses As vendors address their risks, the security
omits a large portion of the companies involved rating should reflect their efforts to do so. If
in the data handling and service providing the rating is driven by relevant data, it should
ecosystem. Security ratings should be internet- immediately reflect changes in vendors’ posture,
wide, able to report on the risk of any digital visualize those changes over time, detail what
business in the world. changed, and how each change affects the
business risks involved.

The Buyer’s Guide to Third Party Risk Management 5


D ATA C O L L E C T I O N A N D P R E S E N TAT I O N Generally, however, the problem is not getting
enough data, but getting the right data: the

Scope of Coverage elements that leads to data breach, that have a


strong correlation with internal practices that
cannot be observed directly, and which have an
Digital Surfaces auditable provenance you can trust.

Every digital business has an internet footprint.


This is the surface area of the domains, devices,
and data belonging to the organization that is
Important
accessible from the internet. Third party risk Threats
solutions analyze this footprint to determine
a company’s posture. The great advantage
of examining this footprint is that it can be Ransomware and Malware
assessed independently and remotely, making Exposed ports and unpatched systems
it an obtainable and objective source of are responsible for nearly all of the major
information. Because every organization has a ransomware and malware attacks that occur,
similar footprint, assessments can be compared including WannaCry and Petya.
and contrasted in a standardized system.

The disadvantage of course is that the


Man-in-the-Middle
internet footprint is only a subset of the
Encryption strategies, including scope, cipher
total digital surface of a business— however,
strength, and configuration, determine whether
it often telegraphs the state of the internal
information passed across the internet can be
infrastructure.
intercepted by a third party.

Trustworthy Attribution
Phishing and Email Fraud
When selecting a third party risk solution, the
Phishing emails trick people into installing
scale of data collection needs to be balanced
malware, exfiltrating sensitive data, and even
against the accuracy and relevance of that
transferring funds. These, and other fraudulent
data. The internet is vast and dynamic, and
emails can be prevented from even reaching
just as in any other risk calculation, there
their human targets by the right defenses.
are tradeoffs between having more data and
having completely trustworthy data. If your
Vulnerable Software
organization wishes to perform substantial
amounts of work sanitizing and correcting your
Most exploits target vulnerabilities that have
vendor’s data, then solutions that cast a wider
been known for over a year and have available
net with a higher rate of false positives may be
patches. Advertising vulnerable software gives
appropriate.
attackers the vectors they need to get inside.

The Buyer’s Guide to Third Party Risk Management 6


Insider Attack Risk Transparency

Dissatisfied employees not only increase the Additionally, the consequences of failed
risk that sensitive data will be misused, but also technical checks should be explained to both
increase the risk of operational failure due to parties in terms of potential loss and damage.
oversight or negligence. Not many people care about whether port
1433 is open to the internet; a great many more
Domain Hijacking people care about corporate databases leaking
onto it.
Redirecting clients to a malicious site allows
attackers to capture usernames, passwords, A vendor risk solution that translates one to the
and any other information normally passed to other will expedite remediation efforts and help
a trusted site. The proper defenses drastically resource and budget planning.
reduce the risk of this possibility.

Prioritized
Remediation
Guidance
Technical Transparency

We’ve focused on the risks themselves and how


to measure them, but what happens after they
are measured?

A good vendor risk solution should transparently


detail how each vendor incurs risk, and offer
technical remediation advice, so that vendors
and their clients can directly relate the security
rating to real world IT practices, and understand
the steps necessary to improve their posture.

A solution should also prioritize these risks so


that work can focus on remediating the most
dangerous aspects first.

The Buyer’s Guide to Third Party Risk Management 7


Automating
VENDOR ASSESSMENT QUESTIONNAIRES

The Need for Assessments


Attestations
Integrated Questionnaires

The Limitations of Security Ratings The core questions asked to determine security
and operations are the same for nearly every
The technical assessments provided by vendor vendor. These questions should be easily
risk solutions are based on the internet available within the vendor risk solution for
footprint. However, the internal technology and general use.
processes used by the vendor also determine
their risk to a great degree. Customization Options

While the external posture does reflect overall Core concerns aren’t the only concerns, and
priorities and efforts, it is only a subset of the a good vendor risk solution should allow the
risk picture. For this reason, it is necessary customization of questionnaires to include
for organizations to get a better picture of any additional important information and omit
a vendor’s internal infrastructure and IT anything unnecessary.
methodology, to complement the independent
external assessment. Automated Delivery and Renewal

The Questionnaire Process Keeping up with vendor questionnaires on


a regular schedule is extremely difficult at
Vendor questionnaires address the need for scale— a good solution for managing third party
more visibility into internal operations by risk should eliminate the manual steps of the
prompting the vendor to disclose their security delivery and renewal process so questionnaires
practices, employed technology, and vendors in get processed in a timely manner.
their supply chain that will affect data handling
and services. Questionnaire Storage and History
The questionnaire aspect should be fully Storing the questionnaires and organizing
addressed in a vendor risk solution so as not them for easy access is important for a vendor
to rely solely on the external examination. A risk solution if it is to be a system of record for
questionnaire automation solution should be vendor due diligence. Likewise, questionnaires
sufficiently extensible and automated to save should be kept in perpetuity and available in a
time and enable human analysts to spend chronological context.
more time examining the most problematic or
complicated responses.

The Buyer’s Guide to Third Party Risk Management 8


Risk Transparency and Remediation • Does the solution provide enough
information for your technical staff to know
Both the vendor and the client should have how to improve your risk score?
context and guidance provided to them by the
questionnaire, based on the answers given. This • How much effort is required to remove false
helps vendors understand areas to improve, and positives from the risks attributed to your
helps clients understand why a vendor’s practice business’ digital footprint?
introduces risk.

Conclusion
F I N A L C O N S I D E R AT I O N S Finding the right solution for third party risk
management is different for every company.

Pricing and Different concerns, priorities, and resources


demand flexibility, while the primary threat

Feasibility vectors introducing cyber risk into a vendor


should be covered comprehensively. The
process of assessment should be as automated
Finally, for whatever functionality a vendor risk as possible, and legible without special training
solution offers, an obstructive price renders it or expertise. The solution should cover both
moot. If high prices don’t remove the solution an independent technical assessment and
completely, they greatly reduce the scope of questionnaires about internal infrastructure and
coverage. A good vendor risk management processes.
solution should be feasible at scale, with a clear
pricing model. Holding vendors to the same standard a
company would hold their own IT department is
Some questions to consider about pricing how we build a resilient digital ecosystem. The
include: threats to data and services in a vendor’s hands
are the same as if they are running on company
• Is the solution priced per vendor? How
servers— and the consequences are the same as
much per vendor?
well.
• Does the price per vendor allow coverage
With the right solution, proactive vendor risk
for all vendors?
management is possible to both perform due
• Will you have to compromise on the diligence when selecting or renewing vendors,
frequency of assessment due to a solution’s and to help remediate vendor risk, so that
price? business can be done safely, in private, and
without interruption.
• Does the solution offer value in terms
of risk mitigation and administration
reduction?

The Buyer’s Guide to Third Party Risk Management 99


Looking for a better, smarter way to protect your
data and prevent breaches?

UpGuard offers a full suite of products for


security, risk and vendor management teams.

Book A Free Demo

or Click Here to learn more about UpGuard’s


VendorRisk solution.

Trusted by hundreds of companies worldwide

© 2019 UpGuard, Inc. All rights reserved. UpGuard and the 909 San Rafael Ave.
UpGuard logo are registered trademarks of UpGuard, Inc. All other Mountain View, CA 94043
products or services mentioned herein are trademarks of their +1 888 882 3223
respective companies. Information subject to change without www.UpGuard.com
notice.
The Buyer’s Guide to Third Party Risk Management 10

You might also like