Securing external suppliers and supply chains: the ISF approach



Similar documents
The Information Security Forum (ISF) and Information security for external suppliers: a common baseline. Gregory Nowak Principal Research Analyst

The 2011 Standard of Good Practice for Information Security. June 2011

SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR

ADRIAN DAVIS INFORMATION SECURITY FORUM

Chapter 2 INDUSTRIAL BUYING BEHAVIOUR: DECISION MAKING IN PURCHASING

An Overview of ISO/IEC family of Information Security Management System Standards

ISO/IEC Part 1 the next edition. Lynda Cooper project editor for ISO20000 part 1

BCS Specialist Certificate in Business Relationship Management Syllabus. Version 1.9 March 2015

Software Asset Management (SAM) and ITIL Service Management - together driving efficiency

Strategic Sourcing. Increasing competitiveness and profitability with effective purchasing

MRO Optimization for high performance. Accenture Product Lifecycle Optimization

A Flexible and Comprehensive Approach to a Cloud Compliance Program

ELA Standards of Competence on the Supervisory/Operational Management Level

The downturn and the cloud..challenge and solution?

Improving global standard to be a key driver of innovation. Colin MacNee. 2012, 2013, 2014 Duncan MacNee Limited.

Information Security ISO Standards. Feb 11, Glen Bruce Director, Enterprise Risk Security & Privacy

Name: Lynda Cooper Date: November 24th. Revising ISO/IEC to fit the future of service management

SPICE for IT-Governance

-Blue Print- The Quality Approach towards IT Service Management

ICT transforming business in the UK. Ian Osborne Director, Business to Business, Intellect

Cloud Computing Security Audit

IT Insights. Managing Third Party Technology Risk

ISM 50 - Business Information Systems

IT Organisation in Change

Supply chain maturity study Comparator report HSCNI

SITA Service Management Strategy Implementation. Presented by: SITA Service Management Centre

Scope of Supply Chain Management (SCM)

ISO/IEC Information & ICT Security and Governance Standards in practice. Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT

Staying a Step Ahead by Comprehensive Industrial MRO Outsourcing

Building an Effective

Strategic IT audit. Develop an IT Strategic IT Assurance Plan

The Future of Best Practices in IT Service Management - ITIL Version 3 Explained

Cloud Solutions for Bigger Business

Compliance and the Cloud: What You Can and What You Can t Outsource

European Cloud Computing. Strategy. Cloud standards. Ken Ducatel DG CONNECT

INTRODUCTION TO ISO 9001 REVISION - COMMITTEE DRAFT

Chayuth Singtongthumrongkul

Hans Bos Microsoft Nederland.

SUPPLY CHAIN SERVICES

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:

Tutorial: Towards better managed Grids. IT Service Management best practices based on ITIL

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

List of courses offered by Marc Taillefer

Overview. Service Description: BCP & DR Strategy (L6)

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Procuring Penetration Testing Services

European Cloud. Computing Strategy. State of play: Ken Ducatel DG CONNECT

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

Security Architecture Principles A Brief Introduction. Mark Battersby , Oslo

Five Steps to Building a Successful Procurement Strategy. SIG Webinar May 2013

Delivering Government Services through the Cloud. Ian Osborne, Intellect Director Cloud & Government IT ICT KTN

Agenda 3/7/ ERM Symposium March 14 16, Continuous Controls Monitoring. I. Changes In Corporate Environment

ITIL Foundation Certification Course

Benchmark of controls over IT activities Report. ABC Ltd

Yong Yoon Kit Associate Director, National Key Economic Area (NKEA) - Business Services

BCS Specialist Certificate in Service Desk & Incident Management Syllabus

How To Save Money On It (It)

ISO/IEC Part 1 the next edition

Systems and software engineering Lifecycle profiles for Very Small Entities (VSEs) Part 5-6-2:

Global Standards and Publications

A complete Information Risk Management solution for ISF Members using IRAM and STREAM

Global Enterprise Business Management Platform Interactive, Intelligent with Controls to Ensure Profit

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

Key Speculations & Problems faced by Cloud service user s in Today s time. Wipro Recommendation: GRC Framework for Cloud Computing

CHIETA S CREDIBLE MECHANISM FOR SKILLS PLANNING, PRESENTATION TO LMIP ROUNDTABLE 5 August 2015

Making HR Simpler. A Guide to HR Software in the Cloud

An Introduction to Third Party Logistics. Panama - September 20, 2012

For the latest information on VHP publications, visit our website:

Revision of ISO 9001 Quality Management Systems Requirements

FACT SHEET SWEDEN ABOUT TATA CONSULTANCY SERVICES (TCS) SWEDEN AND THE NORDIC REGION

Consulting and Professional Services. Strategic, architectural, operational and implementation expertise

Benefits to the Quality Management System in implementing an IT Service Management Standard ISO/IEC

Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK

Challenges in E Procurement Adoption in Europe

HKCS RESPONSE COMMONLY ACCEPTED AUDIT OR ASSESSMENT MECHANISM TO CERTIFY INFORMATION SECURITY STANDARDS

Empowering sustainable and ethical supply chains

Using SCOR to Compete and Grow in a Down Economy

COMMITTEE ON STANDARDS AND TECHNICAL REGULATIONS (98/34 COMMITTEE)

The Cadence Partnership Service Definition

Transcription:

Securing external suppliers and supply chains: the ISF Dr. Adrian Davis, MBCS, CITP, CISMP Principal Research Analyst Information Security Forum

Agenda Introduction The supply chain: business environment The supply chain: infosec perspective The ISF and baseline ISF and ISO collaboration Next steps 2

Introduction: Information Security Forum A Membership organisation, with 300+ corporate Members spanning the globe and all sectors Focus on information security and information risk 3

THE SUPPLY CHAIN: BUSINESS ENVIRONMENT 4

The world is flat... Anything, including IT and information security, can be outsourced anywhere (With apologies to Thomas Friedman) 5 5

From value chain to corporate LEGO Single, vertically integrated organisation Did everything and provided everything Diverse, management heavy, operations (cost of coordination) Firm infrastructure Human resource management Technology development Procurement Inbound Outbound Sales and Operations Logistics Logistics Marketing Outsourcing means that organisations can assemble, break apart and reassemble themselves using different components Focus on core competences The supply chain can also be similarly reconfigured Value Service 6

From mainframe to commodity Services accessed across a network by a user at a dumb terminal Multiple applications Multiple users Charged on a peruse basis Relentless technological innovation The rise of the app Availability, affordability, connectivity, interactivity... 7

From data centre to cloudification... Specialised, highly specified, purpose built facilities Often owned by the organisation or provided as part of an outsourcing deal Fairly easy to audit and monitor Black box the service is bought as is Opportunity to specify is lower Your suppliers may be using the cloud Audit and monitoring may be very different 8

From in stock to just in time Wasting asset stock takes up space, time and cash Opportunity for shrinkage and obsolescence Information is concentrated in warehouses Logistics is king Minimal storage overhead Reduced shrinkage and obsolescence Information has to be freely shared across supply chain 9

THE SUPPLY CHAIN: INFOSEC PERSPECTIVE 10

The scale of the challenge 83% outsource Members organisations >50 typically work in jurisdictions functions such as IT, HR or payroll A typical Member organisation has over 55% outsource business processes 2030 external supplier relationships 11

Key findings from ISF studies 25% 52% highly or very highly satisfied are highly or very highly exposed to external supplier risks with the level of controls in noncritical external suppliers 70% do not have a complete inventory of external suppliers 27% 72% highly or very highly satisfied with the level of controls in critical external suppliers highly concerned about external supplier security arrangements 37% outsource information security, wholly or partially 12

... And we can t specify a standard of protection... There are many out there: Many of these standards: Outsourcing standards (IAOP OSP v8.0, Healthcheck) Address different topics at different levels of detail Security Standards (SOGP, ISO 2700X series, BITS SIG) Are written independently of others IT Standards (COBIT, ITIL, ISO 20000) Offer differing certification or accreditation procedures Other standards (ISO 28000, ISO 25999 / ISO 27031) Auditing standards (SAS 70, ISAE 3402) Some standards: Offer lists of controls others provide no controls Controls may not be mandatory 13

THE ISF APPROACH AND BASELINE 14

Developing an organisational response A: Identifying and classifying external suppliers 2. Define a baseline of information security and privacy arrangements B: Agreeing external supplier security 3. Validate external supplier information security and privacy arrangements regularly 4. Plan for the end 15 C: Validating external supplier security Managing the relationships 1. Identify and classify external suppliers (BIA/riskdriven) D: Handling termination 15

Information security baseline arrangements Based on: Input from over 300 organisations ISF 21 Guidelines for Information Security Aligned with the Standard of Good Practice and Benchmark Domains 1. Governance, Risk and Compliance 2. System management 3. Access management 4. System monitoring and response 5. Network connectivity 6. Electronic communication 7. Business control 8. Development 16

ISF Standard of Good Practice: External Suppliers 17

Measuring external supplier security: ISF Tools Baseline Maturity Assessment Tool (BMAT) Third Party Security Assessment Tool (TPSAT) provides a governance level summary of the maturity of an external supplier's baseline information security arrangements provides a detailed assessment of an external supplier's baseline information security arrangements BMAT tells you how good the external supplier is TPSAT tells you if a control is present in the external supplier Both tools cover the fourstep ISF organisational response 18

What s in it for me? the ISF Acquirer / Buyer Supplier Understand your capability Set our baseline Define what I want in my contract Report against that baseline Measure and hold suppliers to account (audit!) Demonstrate how good we are Discuss improvements Provide extra services based on a strong foundation Provide assurance to my bosses and regulators... Manage multiple responses and audits 19

ISO AND ISF COLLABORATION 20

A global response: ISO / IEC 27036 ISO 27036 Part 1: Overview and Concepts Part 2: Generic requirements Part 3: ICT Supply Chain Part 4: Outsourcing Part 5: Cloud A new multipart standard, called: Information security for supplier relationships ISF heavily involved in its development and in producing content ISF joined SC27 Working group in October 2010 ISF also helping JNSA with the Part 5: Cloud Working to harmonise ISF and the ISO efforts for maximum benefit 21

Development of ISO 27036 ISF Information security baseline arrangements adopted in Part 2 Most ISF recommendations accepted: Shaping Part 1 Concepts, and Part 2 Generic Requirements both of which are normative requirement documents, meaning they are mandatory and can be used for certification purposes (like ISO 27001) ISF continue to provide ISO (working group only) excerpts from ISF documents as input only For example, ISF Cloud, BMAT and TPSAT New MX area to be launched end 2011 to capture Member comments on future drafts electronically 22

NEXT STEPS 23

Future work External suppliers Supply Chain Paper Continued liaison with and input into ISO/IEC 27036 New initiative ISF External Supplier SIG Next teleconference in December Members will have the opportunity to comment on ISO/IEC 27036 Further refinements to ISF tools Examines how ISF can support Members secure their supply chain Several options proposed, including: ISF Supply chain toolkit Alliances with other organisations (not just ISO) Decision in Q1 2012 24

Information Security Forum adrian.davis@securityforum.org http://uk.linkedin.com/in/adriandaviscitp 25 25