morrison- vendor security risk management-r1• managing vendor information security risks •...

15
<<Your name, company name / logo here >> ISACA – San Francisco Fall Conference 2007 Vendor Security Risk Management Dan Morrison September 17, 2007

Upload: others

Post on 26-Sep-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

<<Your name, company name / logo here >>

ISACA – San Francisco

Fall Conference 2007

Vendor Security Risk Management

Dan Morrison

September 17, 2007

Page 2: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 2

Topics of Discussion

• Context-Information, operations & organizationchallenges

• Vendor Security Risk within a System Lifecycle

• Changing Regulatory Expectations

• Example - FFIEC Vendor Management Requirements

• Vendor Related Risks - Information Security

• Key Elements of Vendor Relationship Maturity Model

• Managing Vendor Information Security Risks

• Sample Best Practices for Vendor Security RiskManagement

• Final Thoughts – Do’s / Don’ts / Remembers

Page 3: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 3

Context: Information & operational challenges

Page 4: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 4

Context: Organizational challenges

Page 5: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 5

Vendor Security Risk within a System Lifecycle

Page 6: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 6

Changing Regulatory Expectations

GLBA

– Risk assessment completed

– Core processing system

– Contracts with third parties

FFIEC

– Annual risk assessment

– Technology centric

– Vendors assessed separately

GLBA

– Risk assessment capability

– All data, all forms, all locations

– Oversight of vendors

FFIEC

– Enterprise risk assessment

– Information focus with increasing

technology focus

– Vendors extension of enterprise

– Ability to demonstrate &

communicate Risk Management

Then Now

Page 7: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 7

Federal Financial Institutions Examination CouncilVendor Management Requirements

FFIEC Example

Page 8: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 8

Vendor Related Risks - Information Security

Key Focus Areas1. Vendor Access to Data/Technology ? TBD

2. Vendor Identity Management/Provisioning ?

TBD

3. Governance:- Contract Compliance (Metrics) ?TBD

4. Vendor Compliance to Sub-Contracting ? TBD

5. Business Continuity/DR Planning ? TBD

6. Privacy: (GLBA, HIPAA, CA1386) ? TBD

7. Industry Regulations: (Federal, OCC etc.) ? TBD

Your Current

Maturity Level

Your Future

State Level

Business Impact

Cost, Quality, Service,

Reputation & Risk

Page 9: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 9

Key Elements of Vendor Relationship Maturity Model

1. Management Structures

2. Vendor Rationalization

3. Vendor Selection

4. Vendor Relationships

5. Manage Costs

6. Manage Performance & Quality

7. Use of Technology

8. Manage Information Security Risk

Page 10: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 10

MANAGING VENDOR INFORMATION SECURITY RISKSWithin a Vendor Relationship Maturity Model

EXAMPLE ONLY

Page 11: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 11

Sample Best Practices forVendor Security Risk Management

• Line of Business responsibilityfor vendor risk

• Standard repeatableprocesses for requirementsgathering, risk assessment,controls validation,contracting, service levelmanagement, etc.

• Repository to supportVendor SecurityManagement

• Tools that provide KPI data

• Qualified and trained VRMs

• Support from centralizedteam

• Quality measures for process

• Alternative validationmethods

• Define Key ProcessIndicators (KPIs) for vendorsecurity risk

• Vendor security risk,assessment, monitoring andreporting tools

People

Process

Technology

Page 12: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 12

Final Thoughts – Do’s

• Know where your data is and who has accessto it

• Work with stakeholders within your organizationto understand what security risks are importantand how they apply to your vendor community

• Collect as much supporting information aspossible – specific to your organization and

your vendors

• Leverage existing vendor information if it isapplicable

• Make sure the vendor information is Accurate

Page 13: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 13

Final Thoughts – Don’ts

• Ignore vendor security risk management

• Outsource the issue, thinking it will go away

• Cut corners – be smart by leveraginginformation, tools and processes, however, BEDILIGENT

• “Over-survey” stakeholders

• Believe everything you’re told – look foralternative validation methods

Page 14: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 14

Final Thoughts – Remember

• Outsourcing does not remove your RiskManagement responsibilities

• Be able to defend your risk decisions with harddata through repeatable processes andstandard tools

• Keep your information accurate and current,and your processes tuned

• Think ahead – start collecting information now

Page 15: Morrison- Vendor Security Risk Management-R1• Managing Vendor Information Security Risks • Sample Best Practices for Vendor Security Risk Management • Final Thoughts – Do’s

ISACA – San Francisco Fall Conference 2007 Slide 15

Contact Information

Dan Morrison(415) 498-7066

[email protected]