cincinnati isaca – september, 2014 christopher dorr

39
Cincinnati ISACA – September, 2014 Christopher Dorr Third Party Risk Management

Upload: kacie-hamlyn

Post on 14-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Cincinnati ISACA – September, 2014

Christopher Dorr

Third Party Risk Management

2

Your company spends millions of dollars on IT security – systems, technologies, appliances

• InfoSec professionals

• Internal Audit professionals

• External Auditors

• Processes, technologies, systems

Then some manager in marketing dumps your client data to an Excel spreadsheet, and emails it to a direct mail firm in Omaha.

Perhaps even worse – Usually not random. Usually not one vendor. Often thousands of vendors.

Third Party Risk Management

3

1. What it is

2. Business value and justification• Two main regulatory drivers: HIPAA & OCC 2013-29

3. What it looks like• Case study

Information Security focus, but many additional areas of risk

Overview – Third Party Risk Management

4

Fazio Mechanical Data Breach

Fazio Mechanical is a 100-staff, $12M revenue HVAC company

Perhaps better known as the $250,000,000 Target data breach

Full analysis of the breach is beyond the scope of today’s presentation, and much of what is described below is unconfirmed.

Vendor Breach Background

5

Fazio Mechanical was vendor for Target for HVAC services

Started with Fazio being targeted by typical phishing attack

Fazio connected to Target’s internal systems for billing, contract management and contract submission via vendor portal called “Ariba”

Vendor Breach Background

6

Target Design Process

AribaVendor

Platform

FazioVendor

A/P and GLInternet

Internal

Bank

Internal

POS

POS

POS

7

Target Breach

Ariba

Fazio

A/P and GLInternet

Internal

Bank

Internal

POS

POS

POS

Attacker

SQL Injection & Privilege

escalation

RAM Scraping malware

Staging

Server

8

40,000,000 - Number of credit and debit numbers stolen

70,000,000 - Number of non-credit-card PII records stolen

November 27 to December 15, 2013 – Duration of theft

46% - The percentage drop in profits for 4th quarter 2013 from the year before

$250,000,000 - Total estimated costs as of August 2014

$90,000,000 - Amount paid by Target’s insurers (maxed out)

$54,000,000 - Estimated amount generated from sale of cards stolen

0 – Number of CIOs and CEOs who kept their jobs

Target by the Numbers

9

• 41% to 63% of breaches involved third parties

• Per-record costs of a 3rd party breach higher - $231 vs. $188

• 71% of companies failed to adequately manage risk of third parties

• 92% of companies planned to expand their use of vendors in 2013

• 90% of anti-corruption actions by DOJ involved 3rd parties

Third Party Breach Numbers

10

What Is it?

Third Party Risk Management

11

Third Party Risk Management (TPRM) is the process of analyzing and controlling risks presented to your company, your data, your operations and your finances by parties OTHER than your own company.

Due Diligence is the investigative process by which a company or other third party is reviewed to determine its suitability for a given task. Due diligence is an ongoing activity, including review, monitoring, and management communication over the entire vendor lifecycle.

No universally-accepted framework like CObIT or COSO

TPRM – What It Is

12

Vendors

Customers

Joint Ventures

Counterparties

Fourth parties

TPRM – Who It Is

13

Why Should We Do it?

Third Party Risk Management

14

Reduce likelihood of data breach costs

Reduce likelihood of costly operational failures

Reduce likelihood of vendor bankruptcy

Regulatory mandates may require it

Prudent due diligence – ethical obligation

Audit where the risk is

Enterprise risk portfolio may expose the organization to most risk here

Business Justifications

15

Office of the Comptroller of the Currency (OCC)

US Department of Health & Human Services (HHS)

State data breach laws

Regulatory Guidance

16

Strongest language so far is for financial institutions regulated by the Office of the Comptroller of the Currency

If precedents hold true, this will likely “migrate” to other financial entities, healthcare entities, and government contractors

Consumer Financial Protection Bureau (CFPB)

Since 2012, imposed over $1 billion USD in fines

Was partially in response to 2008 financial crisis. Banks did not manage risk well.

Regulatory Requirements

17

Very comprehensive guidance requiring banks to proactively evaluate ALL risks associated with ALL third parties

Issued in October, 2013, governing all financial institutions regulated by the OCC

Closest thing we currently have to a generally accepted framework

“…. A third-party relationship is any business arrangement between a bank and another entity, by contract or otherwise”

“The Office of the Comptroller of the Currency (OCC) expects a bank to practice effective risk management regardless of whether the bank performs the activity internally or through a third party. A bank’s use of third parties does not diminish the responsibility of its board of directors and senior management to ensure that the activity is performed in a safe and sound manner and in compliance with applicable laws.”

OCC 2013-29

18

An effective risk management process throughout the life cycle of the relationship includes:

• Plans that outline the bank’s strategy, identify the inherent risks of the activity, and detail how the bank selects, assesses, and oversees the third party.• Proper due diligence in selecting a third party.• Written contracts that outline the rights and responsibilities of all

parties.• Ongoing monitoring of the third party’s activities and

performance.• Clear roles and responsibilities for overseeing and managing the

relationship and risk management process.• Documentation and reporting that facilitates oversight,

accountability, monitoring, and risk management.• Independent reviews that allow bank management to

determine that the bank’s process aligns with its strategy and effectively manages risks.

OCC 2013-29

19

In 2009, the HITECH Act extended compliance requirements explicitly to “Business Associates”

Business Associates are persons or entities using PHI to perform services for a covered entity.

PHI – Medical-related PII

Many third parties in healthcare have access – very difficult to perform substantive activities without access to PHI

Can impose fines on Covered Entity (insurer, hospital, etc.) for actions of a delegate

HIPAA - HITECH

20

Massachusetts General Employee – took some work home

Accidentally left 192 patient billing records on subway

HHS imposed $1,000,000 fine

HHS imposed three-year corrective action plan

What would have happened had this been vendor?• Would there be a difference depending on due diligence?

• Fines seem to be directly related to how lackadaisical oversight was

HIPAA Example

21

Many different laws

Almost all laws have provisions requiring notification within certain period after detection

Detection by whom?

Most appear to make no distinction between losses caused by an entity and losses caused by an entity’s vendor

Penalties

• Up to $500,000 in civil penalties per breach for failure to notify timely (Florida)

• $5,000 “per violation” if not received within 10 days. Every subsequent day “not received” is a separate violation (Louisiana)

State Data Breach Laws

22

What Does It Look Like?

Third Party Risk Management

23

1. Initial Risk Review1. Based on risk tier

2. Documentation review

3. On-site review

4. Business process documentation

5. Inherent risk/residual risk

6. Remediation plan

2. Ongoing Monitoring1. Both for changed risks and for changes at vendor

3. Recurring Reviews1. Based on risk tier

What TPRM Looks Like - Process

24

“The Four RMs”

1. Risk Measurement1. Linked to ERM

2. Measures the risk of both the activity itself and of the vendor in particular

2. Risk Management1. Standard mechanisms for dealing with risk: accept, decline,

transfer, modify

3. Risk Monitoring1. New/evolving risks

2. Vendor changes

4. Response Management1. Incident response, both on your part and the vendor’s

What TPRM Looks Like - Elements

25

Using OCC 2013-29 as framework – “Banks should consider the following:”

Legal and regulatory compliance

Financial condition

Qualifications, backgrounds and reputations of company principals

Risk management

Information security and management (including physical and logical security)

Incident reporting and management

Reliance on subcontractors

Contract language, including right to audit and metrics

What TPRM Looks Like - Assessment

26

RandomCo – 300 employee, midsized, technology-oriented company

Specialized in document management and OCR

Being considered for an engagement that required high levels of data security, operational reliability, and performance

Would be subject to HIPAA requirements

Case Study

27

Reviewed SAS 70 (Type 1)

Reviewed architectural documentation

Reviewed online reputation

Reviewed legal entanglements

Reviewed summary financials

Nothing significantly negative was found

Stage I – Case Study

28

Glass-sided stand-alone office building, surrounded by public, ungated parking lot

Scanned for wireless networks. They had “RandomCoProd” SSID• WEP encryption

Unlocked front door

No security cameras

“Netgear” wireless router bolted to wall in stairwell

Unlocked server room and networking closet

RandomCo– Case Study

29

Data center served by single internet feed

“Some” systems were RAID 5

Some “servers” were recycled desktops running Linux

Disaster Recovery Plan never tested

Backup Plan• Network admin drove to data center

• Network admin took tapes out of servers

• Network admin threw the tapes in his trunk

• Network admin drove tapes home

RandomCo – Case Study

30

Not because particularly bad

• In fact, not the worst

Many smaller vendors lack controls

• Many vendors will be 25-200 person companies (28M small bus.)

• No full-time IT, let alone IT Security

Never would have known without on-site

“Vendor Development”

Why this story?

31

Vendor tiering or stratification

Tier 1 – Critical vendors (10%) – PII + critical systems

Tier 2 – Major vendors (40%) – PII OR critical systems

Tier 3 – Vendors (50%) – commodities/low risk purchases

Workflow tools

Capability Maturity Model

Vendor scorecards (maintained by business owner of vendor)

Tools

32

Shared Assessment Group (Santa Fe Group) – Shared Information Gathering Tool (SIG)

Current version costs $5000

Version 6.0 freely available, but dated

Lite and full versions – provides flexibility

Vendor research tools

Dunn & Bradstreet Supplier Risk Manager

Lexis Nexis

Research and monitoring tools

Variety of checklists available online

Contracting language – right to audit, required reporting, standards

Tools

33

Level 0•No processes exist

Level 1Initial

•Processes exist, but are ad hoc and unpredictable

Level 2Managed

•Processes are reactive, “hero driven” and project specific

Level 3Defined

Level 4Quantitativ

e

Level 5Optimized

Risk Capability Maturity Model

• Processes are organized, formalized and documented

• Processes are formalized, measured empirically and controlled

• Processes are highly mature, and emphasize system feedback and improvement

Are the vendor’s risk management processes:• Defined?• Comprehensive?• Repeatable?• Measured?• Reliable?

34

Very cost-effective way to manage risk

One day on-site often is all that is required

Complete review (including on-site) can cost less than $1,000

Lots of “low-hanging fruit”

Emphasis area: Test data

Emphasis area: Data retention & lifespan management

Emphasis area: Physical security

Emphasis area: Cloud reliance and architecture

Often you get more pushback from internal parties. Many vendors appreciate the “free consulting”

Personal Observations

35

70% of companies do not adequately do this now, yet over 90% say they will INCREASE their use of third parties.

Data breaches caused by third parties cost $43 per record more than other breaches, yet account for over 40% of all breaches.

Effective TPRM involves combination of oversight and review of the external partner AND implementation of internal controls and processes.

Given the risk exposure and costs involved, TPRM can be the single most cost-effective risk management program that a company can implement, and Internal Audit and InfoSec can contribute in many significant ways.

Summary

36

Third-party risk management failures contributed to attacks

Vendor used FREE Malwarebytes Anti-Malware software

The free version is only an on-demand scanner. No real-time scanning.

Target did not require vendors to use multi-factor authentication

If vendor used free anti-malware, what is probability that it required users to take security training? Or implement enterprise email system that might have caught phishing attack?

But Target also left vast amounts of sensitive data about vendors on unsecured systems. This is also about vendor management.

Ariba is vendor too. Was testing/scanning for SQL injection and architecture reviewed?

How was Ariba monitoring for unusual activity?

Target Breach - TPRM

37

Questions?

38

1. http://compliance.med.nyu.edu/news/documenting-inpatient-admissions

2. http://www.grantthornton.com/~/media/content-page-files/health-care/pdfs/2013/HC-2013-AIHA-wp-HIPAA-rule-data-control-concerns.ashx

3. http://www.occ.gov/news-issuances/bulletins/2013/bulletin-2013-29.html

4. http://www.computerweekly.com/news/2240178104/Bad-outsourcing-decisions-cause-63-of-data-breaches

5. http://www.experian.com/assets/data-breach/brochures/ponemon-aftermath-study.pdf

6. http://www.fierceitsecurity.com/story/third-party-vendor-behind-possible-lowes-data-breach/2014-05-26

References

39

1. http://www.navexglobal.com/company/press-room/navex-global-survey-7-10-us-companies-neglect-third-party-risk

2. http://www.ponemon.org/blog/ponemon-institute-releases-2014-cost-of-data-breach-global-analysis

3. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1986461

4. http://listserv.educause.edu/cgi-bin/wa.exe?A3=ind1112&L=SECURITY&E=base64&P=1183182&B=--_003_BF662A4EE06D844081EA3B2DB8CCF22B1FDD3423B4SSUMPEXCLUS01_&T=application%2Fvnd.ms-excel;%20name=%22SIGv6.2.xls%22&N=SIGv6.2.xls&attachment=q

5. http://www.privacyrights.org/data-breach

6. http://www.ejise.com/issue/download.html?idArticle=858

7. http://krebsonsecurity.com/2014/02/email-attack-on-vendor-set-up-breach-at-target/

8. http://krebsonsecurity.com/2014/05/the-target-breach-by-the-numbers/

References