Third Party Vendor Risks Flashcards
Define Third-party Vendor Risks
Potential security and operational challenges from external collaborators
Scope:
Encompasses vendors, suppliers, or service providers
Risks:
Impact on integrity, data security, and overall business continuity
Common Threat Vectors and Attack Surfaces
Threat Vectors
Paths attackers use to gain access
Attack Surfaces
Points where an unauthorized user can try to enter
3 Types of Vulnerabilities
1: Hardware Vulnerabilities
Components with vulnerabilities
2: Software Vulnerabilities
Applications with hidden backdoors
3: Operational Vulnerabilities
Lack of cybersecurity protocols
Vendor Assessments
Evaluation
Pre-partnership assessment
Penetration Testing - testing vendor security
Audit Rights - right to audit vendors
Evidence Collection - internal and external audit
evidence
Vendor Selection and Monitoring
Importance - meticulous selection process
Vigilance - Ongoing monitoring of vendor performance
Contracts and Agreements
Basic Contracts - forming relationships
Nuanced Agreements - SLAs, MOUs, NDAs for specific
safeguards
Supply chain risks - hardware manufactures
Products like routers and switches are composed of
many components from various suppliers
Component tampering or untrustworthy vendors can
introduce vulnerabilities
Rigorous supply chain assessments needed to trace
origins and component integrity
Trusted foundry programs ensure secure
manufacturing
Supply chain risks - Secondary/Aftermarket Sources
Risk of acquiring counterfeit or tampered devices
Devices may contain malware or vulnerabilities
Budget-friendly but high-risk option
Supply chain risks - Software Developers/Providers
Software developers and software providers are
integral cogs in the supply chain
However, software can introduce vulnerabilities
Check for proper licensing, authenticity, known
vulnerabilities, and malware
Open-source software allows source code review
Proprietary software can be scanned for vulnerabilities
Supply chain risks - Service Providers/MSPs
Managed Service Providers
Organizations that provide a range of technology
services and support to businesses and other clients
Supply chain risks - Security challenges with Software-as-a-Service (SaaS) providers and considerations
Data confidentiality and integrity concerns
Assess provider’s cybersecurity protocols and support
for security incidents
Vendor selection should consider due diligence,
historical performance, and commitment to security
Considerations
Evaluate data security measures
Ensure confidentiality and integrity
Assess cybersecurity protocols
Response to a security breach
Define Supply Chain Attacks
An attack that targets a weaker link in the supply chain
to gain access to a primary target
Exploit vulnerabilities in suppliers or service providers
to access more secure systems
CHIPS Act of 2022
U.S. federal statute providing funding to boost
semiconductor research and manufacturing in the U.S.
Aims to reduce reliance on foreign made
semiconductors, strengthen the domestic supply chain,
and enhance security
What are Semiconductors
Essential components in a wide range of products, from smartphones and cars to medical devices and defense systems
4 ways of Safeguarding Against Supply Chain Attacks
1: Vendor Due Diligence
Rigorous evaluation of vendor cybersecurity and supply
chain practices
2: Regular Monitoring & Audits
Continuous monitoring and periodic audits of supply
chains to detect suspicious activities
3: Education and Collaboration
Sharing threat information and best practices within
the industry
Collaborating with organizations and industry groups
for joint defense
4: Incorporating Contractual Safeguards
Embedding cybersecurity clauses in contracts with
suppliers or service providers
Ensuring adherence to security standards with legal
repercussions for non-compliance
Define Vendor Assessments
Process to evaluate the security, reliability, and
performance of external entities
Crucial due to interconnectivity and potential impact on
multiple businesses
Entities in Vendor Assessment
Managed Service Providers (MSPs)
Manage IT services on behalf of organizations