Third Party Security: Are your vendors compromising the security of your Agency?



Similar documents
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Into the cybersecurity breach

Cybersecurity The role of Internal Audit

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

Security from a customer s perspective. Halogen s approach to security

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

PCI Compliance for Cloud Applications

Clinical Trials in the Cloud: A New Paradigm?

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

Hands on, field experiences with BYOD. BYOD Seminar

PCI Compliance. Top 10 Questions & Answers

Cloud Computing. Making legal aspects less cloudy. Erik Luysterborg Partner Cyber Security & Privacy Belgium EMEA Data Protection & Privacy Leader

Information Technology: This Year s Hot Issue - Cloud Computing

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Security Threat Risk Assessment: the final key piece of the PIA puzzle

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

HIPAA Security & Compliance

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

GoodData Corporation Security White Paper

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

PCI Compliance Top 10 Questions and Answers

Managing data security and privacy risk of third-party vendors

Evergreen Solutions Lowering the cost of EHR ownership

Cisco Cloud Assessments. Justin Tang

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

Cloud Computing An Auditor s Perspective

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Anatomy of a Cloud Computing Data Breach

PCI DSS COMPLIANCE DATA

Projectplace: A Secure Project Collaboration Solution

Cloud Security Introduction and Overview

INCIDENT RESPONSE CHECKLIST

How to ensure control and security when moving to SaaS/cloud applications

John Essner, CISO Office of Information Technology State of New Jersey

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

PCI Compliance Overview

Cloud Security and Managing Use Risks

Nine Network Considerations in the New HIPAA Landscape

Information security controls. Briefing for clients on Experian information security controls

Security Controls What Works. Southside Virginia Community College: Security Awareness

PCI DSS Reporting WHITEPAPER

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

THE BLUENOSE SECURITY FRAMEWORK

Securing Oracle E-Business Suite in the Cloud

KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT

Supplier Security Assessment Questionnaire

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Click to edit Master title style

Security & Cloud Services IAN KAYNE

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Data Security Considerations for Research

HIPAA Privacy & Security White Paper

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

PCI Requirements Coverage Summary Table

Cloud Computing: Legal Risks and Best Practices

Services Providers. Ivan Soto

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization

Client Security Risk Assessment Questionnaire

Risk Management of Outsourced Technology Services. November 28, 2000

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Top 10 Cloud Risks That Will Keep You Awake at Night

Taking Information Security Risk Management Beyond Smoke & Mirrors

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Ayla Networks, Inc. SOC 3 SysTrust 2015

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

Security Information & Policies

Technical breakout session

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

PCI DSS Top 10 Reports March 2011

Transcription:

Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010

Agenda 3 rd Parties: Here to stay Size and Nature of the Problem Risks and Risk Mitigation Clouds in our Eyes Policies and Assessments Recommended resources Q/A

3 rd Parties: Here to Stay Public/Private Partnership Specialized Skill Sets Cost Considerations Net: Can t unscramble the egg and probably wouldn t if we could

SIZE OF THE PROBLEM

Dimensions of the Problem On-Site Contractors access to sensitive information Application Development IT OPS - admin rights to apps and systems External service providers Business services (HR, payments, printing, etc.) Projects (web site development/hosting) Software / application vendors Outsourced support services ASP/ SaaS / Cloud Hosting Agency applications Housing sensitive data (PII, PHI) Handy Internet services (Survey Monkey, itunes U, etc.)

What s the Risk? Verizon Business Data Breach Incident Report 11% of breach events involved third-party partner as primary vector* 27% of breach events involve multiple sources (e.g. external + partner) 26% of compromised asset were managed externally; an additional 9 percent were co-managed *Note: based on data collected by VZB and Secret Service only and are for intentional breaches only, not contributory errors

e.g. Veterans Administration May 2010 3 rd party contractor s unencrypted laptop stolen with Sensitive Information 3 rd party certified all laptops used encrypted hard drives VA policy requires encryption Over 500 3 rd parties refusing to sign encryption clause

RISKS AND RISK MITIGATION

Shared State of Texas Risk How many different accounts does your vendor service? What are you willing to bet they re using the same admin password for all of them? What are you willing to bet that the password is password?

Dude, Where s Our Firewall? How many trusted entry paths do you have to your network? How many connections do you have to third-party partners apart from outsourcing? Do you still really think you have a perimeter?

What s Most Important? Maintaining control over security Maintaining accountability Ensuring legal compliance

What s Not? Data Mapping Asset Classification Security Control Frameworks used by 3 rd parties Technical Controls in the absence of good business processes SAS-70s *

Methods of Control Technical control Business Processes / Procedural control Contractual control

The Password Problem System administrators have ultimate technical control

Balance: Technical Compensations Privileged Account Management Multifactor Authentication Balance: Process / Procedural Oversight Separate, immediate log collection Regular audits Paper throttle Workflow system Signoff requirements Balance: Contractual Acceptance or rejection of personnel Compliance with written policies

The Knowledge Problem If they have all the technical expertise, how do you know what they re doing? Balance: Procedural Separate technical expertise Regular reviews Balance: Contractual Solutions and practices must comply with legal requirements

The Money Problem Vendor can influence decision-making by judicious use of price tags Balance: Contractual Preserve right to do it yourself On-demand cost reviews and bids

Security Separation of Duties Contractor provides high-level security design documents, generic procedures, baseline security settings Agency determines which technical measures are needed to comply with laws (HIPAA, FERPA, IRS, CJIS, etc.) Consider having 3 rd party assess security of the source code and architecture This may cost extra

Application Security Software Development Life Cycle (SDLC) Do they even have one? Include them in yours Threat modeling Test cases including security QA phase includes security scanning/pen testing Don t forget the platform

No, really Warranties Any security issues relating to flaws in the implementation or design of the software shall be remediated at the expense of the vendor, regardless of when they are discovered, for the life of the contract. If anyone screams at this, kindly remind them that Microsoft et al. do this already; it s called maintenance.

What about enhancements? Any requests for new security functionality (such as different access control measures, new encryption, more detailed logging, etc.) shall be considered the same as other new operational functionality and shall be handled according to the software enhancement agreements in this document.

System Integrators Purchased product not under System Integrator s control Engagement Acceptance and Signoff Use of Off-shore vs. local resources Product Vendor Professional Services vs. Independent Professional Services

Verification Make the developer do their own security testing OWASP Application Security Verification Standard (ASVS) Project

Levels of Due Diligence What is our obligation to assess and monitor security? What is reasonable to ask of 3 rd Party providers? What responsibility does the State have in this area?

Additional Recommendations Eliminate unnecessary data; keep tabs on what s left Make sure essential controls are met Check the above again Test and review web applications Audit user accounts and monitor privileged activity Filter outbound traffic Monitor and mine event logs

CLOUD COMPUTING AND SAAS

Clouds get in our eyes Software as a Service (SaaS) Quick to set up No review by procurement or legal License = EULA No capital procurement required Monthly subscription (Watch out for ProCard charges!) No internal management costs

Forecast Cloudy with a 100% of chance of risk Security by Obscurity: e.g. Amazon S3 Controls: Lack there of for Security Loss: Of Physical control of agency information, Of Governance of the information Of Information itself Not Lost: Agency data retention AFTER contract conclusion / termination Cloudy Staff: Background checks for employees? Third party contractors? Water Leaks: Multi-tenancy increase chance of intentional and unintentional data access by one tenant of another tenant s information

Onward through the cloud One size does not fit all Cloud providers allow different levels of visibility / auditability Cloud Audit project: aka Automated Audit, Assertion, Assessment, and Assurance API (A6)

POLICIES, PROCEDURES AND ASSESSMENTS

Third Party Security Policies You have internal Policies but what about third parties? Explicit third Party Policies and Procedures Contract language

What to put in the contract General: Applicable All third Parties Security and Privacy Policies and Procedures & Legal Requirements Incident response Control and auditing of administrative privileges, user access Control and use of security software Right to Audit Laptops and removable media Account Management and Access Controls Data and Application: Hosting/Housing Agency data Inventory, Data classification levels, and record retention schedules Vulnerability scanning and remediation Security configuration standards Backup security Business continuity / disaster recovery Change Management Network Connectivity: 3 rd parties w/ direct access to Agency Network Business continuity / disaster recovery Encryption Telephone, email Pull vs. Push

Assessments To Self-Assess or Not to Self-Assess References and Referrals Model: Financial Services Industry Components to look at: IT and Risk Security Policies Asset management Security Awareness Physical and Environmental Access control Communications and Operations Business Continuity Management of Privacy Incident management Compliance

The bottom Line: Are all vendors bad? Well, not all of them Trusted partners with security expertise

Questions? Wendy Nather Texas Education Agency Wendy.Nather@tea.state.tx.us Michael Wyatt Deloitte & Touche LLP miwyatt@deloitte.com

RESOURCES

Resources The Shared Assessments Program sponsored by BITS http://www.sharedassessments.org General Electric Third Party Information Security Policy http://www.geae.com/aboutgeae/doingbusinesswith/docs/ge_thirdparty_po licy.doc The Cloud Security Alliance: http://www.cloudsecurityalliance.org/ The Open Group's Jericho Forum: https://www.opengroup.org/jericho/index.htm OWASP Application Security Verification Standard (ASVS) Project http://www.owasp.org/index.php/category:owasp_application_security_v erification_standard_project Cloud Audit Project - http://www.cloudaudit.org

This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this presentation. About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu, a Swiss Verein, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu and its member firms. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Copyright 2010 Deloitte Development LLC. All rights reserved.