Castellan brings every aspect of resilience management – from readiness to response – together in one place, so you can stop hoping and start knowing.
Now you’re ready.TM
Cyber attackers often look for the most promising and lucrative opportunities and, as we have seen in the past year, that’s often taking place across organizations’ supply chains.
According to Verizon’s 2022 Data Breach Investigation Report, the supply chain was responsible for 62% of system intrusion incidents in 2021. The report points out the growing interconnected risks that now exist between organizations, their vendors, partners, and third parties.
While third-party risks have always existed, it became a harsh reality for many organizations when, in 2020, hackers targeted SolarWinds, an information technology company. That attack, according to an SEC report, could have affected about 18,000 organizations.
Potential victims used a SolarWinds product called Orion, including non-governmental organizations, Fortune 500 companies, and several U.S. government entities such as the Department of Homeland Security, the National Nuclear Security Administration, the State Department, the Pentagon, the U.S. Treasury, and the Department of Energy.
In this incident, nation-state actors inserted malicious code into Orion, which gave attackers access to Orion users. As often happens with third-party attacks, this attack was unnoticed for months.
About 20% of breaches disclosed in the Verizon report took months or longer to discover, and of those breaches, about half were discovered by “actor disclosure,” meaning on the asset or as a ransom note or other information, not system detection.
While attacks like SolarWinds help bring awareness to security risks associated with supply chains, most organizations still have a lot of ground to make up for supply chain risk assessments and risk management.
According to Prevalent’s 2022 Third-Party Risk Management Study, almost half of respondents (45%) experienced a third-party security incident in the previous 12 months. That’s up from 21% the previous year. And, almost 70% indicated that third-party data breaches are a top security concern.
The report indicates that third-party risk is finally becoming more strategic for organizations, with about 67% of respondents saying their executives and board members have more visibility into these risks in the past year. However, 12% are not monitoring for third-party breaches and on top of that another 8% have no third-party incident response program at all.
This report also says, on average, it takes respondents about two-and-a-half-weeks between incident discovery and remediation.
While third-party risk is gaining more attention, many organizations struggle to collect risk data and take timely actions or produce accurate reports.
What’s the hang-up?
Those pesky old spreadsheets.
In fact, the Prevalent report says that in 2022, some 45% of respondents are still using spreadsheets for third-party risk assessments. As a result, for about 40%, it can take between a week and a month to create reports and audit evidence about those supply chain risks.
On top of that, many still struggle to produce reports that clearly show they’re meeting compliance requirements and about half say it limits them in terms of proactive third-party incident response and prevents them from assessing risks at every stage of a vendor’s lifecycle.
The harsh reality for organizations that stick with these spreadsheets is this type of risk management is only going to get harder as risk audits and compliance requirements continue to be increasingly complex. It’s a challenge further heightened by a constantly evolving and expanding risk landscape as well.
A resilience management platform that enables continuous visibility into risks across your entire enterprise can help streamline and automate many of those tedious, error-prone tasks now handled by spreadsheets and can certainly help close security gaps that are often undiscovered using outdated and ineffective tools such as spreadsheets.
So, what can you do? How can your organization ramp up your vendor resiliency and improve your third-party risk management practices? Here are a few suggestions:
A few key points here worth noting: It’s essential to examine your relationship with your third-party vendor. For example, ask:
2. Understand Vendor Security Protocols
Historically, many organizations adopted a service level agreement (SLA) or other documentations at the beginning of a vendor relationship addressing security standards. As we’re seeing with increased third-party breaches, this is no longer an effective way to manage third-party risks.
Instead, your vendor risk assessments should be ongoing. Be sure they also align with your organization’s security and compliance standards.
Question to consider:
3. Live by Least Privilege
As we move into resilience management with the mindset we’re no longer preparing for if an attack may happen, but when, it’s important to think about how much access your vendors may have to your data and systems.
To better protect your organization, adopt a least privilege access (LPA) policy that ensures your third-party vendors only have access to the data and systems needed to perform their roles. As these roles may evolve over time, be sure to routinely review your user access privileges to ensure least privilege maintenance.
4. Implement Reporting and Continuous Monitoring Practices
When we talk about vendor risk, while cyber risks are important, vendors bring a range of other potential risks to the table, for example, financial, regulatory and compliance, reputation, geopolitical, environmental, and others.
These risks are constantly evolving, so be sure to implement reporting and continuous monitoring practices that ensure you’re staying on top of these risks.
5. Know Your Risk Thresholds and Alternatives
And while knowing your vendor risks is a step in the right direction, it’s also important your organization has the capabilities to analyze those risks against your organization’s risk threshold or risk appetite and know who is tasked with determining if those risks are accepted, avoided, mitigated, or remediated.
Often, even with great vendor-client relationships, sometimes the third-party risk introduced is just too great. In those instances, you’ll want to have a contingency plan in place.
Some things to consider:
Does your organization need help identifying third-party risks and building or maturing an effective third-party risk management program? Contact a Castellan advisor today to learn more about how we can help.
Now you’re ready.TM
Get resilience insights delivered to your inbox.
Save a spot in our upcoming webinar “The Current State of Business Continuity” on Wednesday, October 19th at 11:00am ET / 4:00pm BST.