Top Banner
SECURING THE CHAIN A PRACTICAL APPROACH TO SUPPLIER RISK MANAGEMENT
48

Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

Jan 24, 2017

Download

Technology

Risk Factory
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

SECURING THE CHAIN A PRACTICAL APPROACH TO SUPPLIER RISK MANAGEMENT

Page 2: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891
Page 3: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

CHAT UP LINE # 23

“Over 75% of reported breaches over the last 18 months were sourced to a trusted connection”.

Page 4: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

ONE WORD…

Page 5: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

TWO WORD…

Page 6: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

WHERE TO START?

Page 7: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

Practical (adjective): of or about the actual doing or use of something rather than with theory and ideas: or of an idea, plan, or method; likely to succeed or be effective in real circumstances; feasible.

Page 8: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

DEFINE “SUPPLIER”

Page 9: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

Supplier (noun): A person or entity that is the source for goods or services.

Page 10: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

WRITE “IT” DOWN & LIST THEM

Page 11: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

WHAT IS “IT” YOU’RE TRYING TO PROTECT ?

Page 12: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

INFORMATION?

INTELLECTUAL PROPERTY?

PHYSICAL PROPERTY?

PERSONNEL?

BRAND?

ACCESS TO YOUR SYSTEMS?

ACCESS TO OTHER SYSTEMS?

Page 13: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

WRITE “IT” DOWN

Page 14: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

INFORMATION CLASSIFICATION GUIDE

NON-DISCLOSURE AGREEMENT

INTELLECTUAL PROPERTY AGREEMENT

BRAND IMPACT STATEMENT

MINIMUM CONNECTIVITY REQUIREMENTS

Page 15: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

LOCATE & DOCUMENT “IT”

Page 16: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

DISCOVERY SCANNING (YOUR NETWORK)

ASSET REGISTER

RISK REGISTER

SUPPLIER MANAGEMENT OWNER

DISCOVERY SCANNING (THEIR NETWORK)

Page 17: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

CONFIRM WHO HAS ACCESS TO “IT”

Page 18: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

COMPANY ACCESS REGISTERS

LIST AUTHORISED PERSONNEL (YOURS)

LIST AUTHORISED PERSONNEL (THEIRS)

Page 19: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

PROFILE THEM

Page 20: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

SUPPLIER CLASSIFICATION SCHEME

SERVICE RENDERED

LENGTH OF CONTRACT

SENSITIVITY OF INFORMATION PROCESSED

AMOUNT OF INFORMATION

COMPLIANCE REQUIREMENTS (PCI, DPA, OTHER…)

HOW: PROCESSED, STORED OR TRANSMITTED

Page 21: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

SORT THEM

Page 22: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891
Page 23: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

SUPPLIER CLASSIFICATION SCHEME

SERVICE RENDERED

LENGTH OF CONTRACT

SENSITIVITY OF INFORMATION PROCESSED

AMOUNT OF INFORMATION

COMPLIANCE REQUIREMENTS (PCI, DPA, OTHER…)

HOW: PROCESSED, STORED OR TRANSMITTED

Page 24: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

EXAMPLE

Category 3: MEDIUM

Supplier processes up to 25,000 records of PII data subject to the DPA or ; Supplier is connected to systems or ; data is accessed by a 3rd party

Category 1: CRITICAL

Supplier processes over 25,000 records of Sensitive PII records subject to the DPA or ; Supplier processes over 25,000 records subject to the PCI DSS

Category 4: LOW

Supplier processes data not subject to the DPA and; Supplier is not connected to systems and; data is not accessed by a 3rd party

Category 2: HIGH

Supplier processes up to 25,000 records of Sensitive PII records subject to the DPA or ; Supplier processes up to 25,000 records subject to the PCI DSS or ; Supplier processes over 25,000 records of PII data subject to the DPA

Page 25: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

DETERMINE HOW SHOULD THEY PROTECT “IT”

Page 26: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

SPECIFY SECURITY CONTROLSFRAMEWORKAPPLICABLE?ENFORCEABLE?

SPECIFY CONTROL OBJECTIVES & EVIDENCESPECIFY CONTROL TESTING REQUIREMENTSSPECIFY REMEDIATION PERIODSDEFINE ISSUESWEIGHT SECURITY CONTROLSCREATE RISK FORMULASPECIFY AUDIT PERIODS

Page 27: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

DETERMINE RISK METRICS

Page 28: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

SUPPLIER RISK MANAGEMENT

SUPPLIER RISK

FORMULA

CONTROL RISK

FORMULA

CONTROL WEIGHTING FORMULA

CONTROL FRAMEWORK

SUPPLIER CLASSIFICATION SCHEME

Page 29: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

CONTROL FRAMEWORK

Page 30: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

CONTROL CLARITY

Control Objective Evidence Testing Procedure

Page 31: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

CONTROL WEIGHTING

1. Published information security policies 2. Asset Register3. Risk Register4. Anti-malware 5. 2-Factor authentication for remote

access to your systems6. Incident Response Plan7. Business Continuity Plan8. Security requirements in 3rd party

contracts9. Network penetration testing program 10.Compliance program

CRITICAL STANDARDAll non-critical (90)

Page 32: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

WEIGHTING FORMULA

89 controls weighted at .5  = for total of 4511 controls weighted at 5   = for total of 55

Page 33: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

RISK INDICATOR

0-35 = HIGH Risk 36-75 = MEDIUM Risk76-100 = LOW Risk

Page 34: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

SPREAD SHEET EXAMPLE

EVIDENCE

Page 35: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

SUPPLIER RISK MANAGEMENT

SUPPLIER RISK

FORMULA

CONTROL RISK

FORMULA

CONTROL WEIGHTING FORMULA

CONTROL FRAMEWORK

SUPPLIER CLASSIFICATION SCHEME

Page 36: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

DETERMINE REPORTING METRICS

Page 37: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

REPORTING METRICS

REPORTING PERIOD(S)SUPPLIER CLASSIFICATIONSSUPPLIER RISK PROFILECONTINUOUS PROFILERISK WATCH LISTISSUESRECOMMENDED ACTIONS

Page 38: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

SITE ASSESSMENTS

Review service(s) & deliverables provided Review amount, sensitivity & locations of data processed,

stored & transmitted Review of ICT systems infrastructure (scan) Review remote & 3rd party connections to ICT systems Review 3rd party services Review office access control systems Review responses to framework questionnaire Random verification of 25% controls.

Page 39: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

SERVICE LEVEL AGREEMENTS

Page 40: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

DISCOVERY SCANNNING REQUIREMENT

CLASSIFICATION GUIDE REQUIREMENT

SECURITY RESOURCE REQUIREMENT

ASSET REGISTER REQUIREMENT

RISK REGISTER REQUIREMENT

ACCESS PRIVILEGES

CONNECTIVITY REQUIREMENTS

SECURITY CONTROLS

CONTROL EVIDENCE REQUIREMENT

Page 41: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

EMERGENCY RESPONSE REQUIREMENT

INTERRUPTION OF SERVICE CLAUSE

BUSINESS CONTINUITY PLAN REQUIREMENT

SECURITY TESTING CLAUSE

BREACH CLAUSE

REPORTING CLAUSE

OVERSIGHT & AUDIT AUTHORITY CLAUSE

LIABILITY OWNERSHIP CLAUSE

CONTRACT PENALTIES CLAUSE

INSURANCE CLAUSE

Page 42: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

SECURITY TESTING CLAUSE

BREACH CLAUSE

REPORTING CLAUSE

OVERSIGHT & AUDIT AUTHORITY CLAUSE

LIABILITY OWNERSHIP CLAUSE

CONTRACT PENALTIES CLAUSE

INSURANCE CLAUSE

Page 43: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

THE BIG PICTURE

Page 44: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891
Page 45: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

PRAGMATIC APPROACH

DEFINE SUPPLIERDEFINE “IT”LOCATE “IT”CONFIRM WHO HAS ACCESS TO “IT”PROFILE THEMSORT THEMDETERMINE HOW THEY SHOULD PROTECT “IT”DETERMINE RISK METRICSDETERMINE REPORTING METRICSSERVICE LEVEL AGREEMENTSMUST BE PART OF A BIGGER PICTURE

Page 46: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

OUR NEXT LESSON…

YOUR SUPPLIER’S SUPPLIERS

Page 47: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

LAST THOUGHTS

SLOWLY, SLOWLY CATCH-EE MONKEY

NEVER REQUIRE SOMETHING YOU’RE NOT DOING YOURSELF

NEVER REQUIRE SOMETHING YOU CAN’T / WON’T ENFORCE

DON’T BE A CLIENT - BE A MENTOR

Page 48: Riskfactorysecuringthechainsupplierriskmanagementbestpractices 151125163457-lva1-app6891

A DIFFERENT PERSPECTIVE FROM:

www.riskfactory.com0800 978 8139

www.riskfactory.com0800 978 8139