Third Party Vendor Risks Flashcards

1
Q

Define Third-party Vendor Risks

A

Potential security and operational challenges from external collaborators

Scope:
 Encompasses vendors, suppliers, or service providers

Risks:
 Impact on integrity, data security, and overall business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common Threat Vectors and Attack Surfaces

A

Threat Vectors
 Paths attackers use to gain access

Attack Surfaces
 Points where an unauthorized user can try to enter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 Types of Vulnerabilities

A

1: Hardware Vulnerabilities
 Components with vulnerabilities

2: Software Vulnerabilities
 Applications with hidden backdoors

3: Operational Vulnerabilities
 Lack of cybersecurity protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vendor Assessments

A

Evaluation
 Pre-partnership assessment
 Penetration Testing - testing vendor security
 Audit Rights - right to audit vendors
 Evidence Collection - internal and external audit
evidence

Vendor Selection and Monitoring
 Importance - meticulous selection process
 Vigilance - Ongoing monitoring of vendor performance

Contracts and Agreements
 Basic Contracts - forming relationships
 Nuanced Agreements - SLAs, MOUs, NDAs for specific
safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Supply chain risks - hardware manufactures

A

 Products like routers and switches are composed of
many components from various suppliers
 Component tampering or untrustworthy vendors can
introduce vulnerabilities
 Rigorous supply chain assessments needed to trace
origins and component integrity
 Trusted foundry programs ensure secure
manufacturing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Supply chain risks - Secondary/Aftermarket Sources

A

 Risk of acquiring counterfeit or tampered devices
 Devices may contain malware or vulnerabilities
 Budget-friendly but high-risk option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Supply chain risks - Software Developers/Providers

A

 Software developers and software providers are
integral cogs in the supply chain
 However, software can introduce vulnerabilities
 Check for proper licensing, authenticity, known
vulnerabilities, and malware
 Open-source software allows source code review
 Proprietary software can be scanned for vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Supply chain risks - Service Providers/MSPs

A

Managed Service Providers
 Organizations that provide a range of technology
services and support to businesses and other clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Supply chain risks - Security challenges with Software-as-a-Service (SaaS) providers and considerations

A

 Data confidentiality and integrity concerns
 Assess provider’s cybersecurity protocols and support
for security incidents
 Vendor selection should consider due diligence,
historical performance, and commitment to security

Considerations
 Evaluate data security measures
 Ensure confidentiality and integrity
 Assess cybersecurity protocols
 Response to a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Supply Chain Attacks

A

 An attack that targets a weaker link in the supply chain
to gain access to a primary target
 Exploit vulnerabilities in suppliers or service providers
to access more secure systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CHIPS Act of 2022

A

 U.S. federal statute providing funding to boost
semiconductor research and manufacturing in the U.S.
 Aims to reduce reliance on foreign made
semiconductors, strengthen the domestic supply chain,
and enhance security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Semiconductors

A

Essential components in a wide range of products, from smartphones and cars to medical devices and defense systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

4 ways of Safeguarding Against Supply Chain Attacks

A

1: Vendor Due Diligence
 Rigorous evaluation of vendor cybersecurity and supply
chain practices

2: Regular Monitoring & Audits
 Continuous monitoring and periodic audits of supply
chains to detect suspicious activities

3: Education and Collaboration
 Sharing threat information and best practices within
the industry
 Collaborating with organizations and industry groups
for joint defense

4: Incorporating Contractual Safeguards
 Embedding cybersecurity clauses in contracts with
suppliers or service providers
 Ensuring adherence to security standards with legal
repercussions for non-compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Vendor Assessments

A

 Process to evaluate the security, reliability, and
performance of external entities
 Crucial due to interconnectivity and potential impact on
multiple businesses
 Entities in Vendor Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Managed Service Providers (MSPs)

A

Manage IT services on behalf of organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Penetration Testing of Suppliers

A

Validates supplier’s cybersecurity practices and potential risks to your organization

17
Q

Right-to-Audit Clause

A

 Contract provision allowing organizations to evaluate
vendor’s internal processes for compliance
 Ensures transparency and adherence to standards

18
Q

Independent Assessments

A

 Evaluations conducted by third-party entities without a
stake in the organization or vendor
 Provides a neutral perspective on adherence to security
or performance standards

19
Q

Supply Chain Analysis

A

 Assessment of an entire vendor supply chain for
security and reliability
 Ensures integrity of the vendor’s entire supply chain,
including sources of parts or products

20
Q

Vendor Selection Process includes

A

 Evaluating financial stability
 Operational history
 Client testimonials
 On-the-ground practices to ensure cultural alignment
 Check for conflicts of interest that could bias the
selection process

21
Q

Vendor Questionnaires

A

 Vendor questionnaires provide insights into operations,
capabilities, and compliance
 Standardized criteria for fair and informed decision-
making

22
Q

Rules of Engagement

A

 Guidelines for interaction between organization and
vendors
 Cover communication protocols, data sharing, and
negotiation boundaries
 Ensure productive and compliant interactions

23
Q

Vendor Monitoring

A

 Mechanism used to ensure that the chosen vendor still
aligns with organizational needs and standards
 Performance reviews assess deliverables against
agreed-upon standards and objectives

24
Q

Feedback loops

A

Involve a two-way communication channel where both the organization and the vendor share feedback

25
Q

7 Types of Contracts and Agreements

A

1: Basic Contract
 Versatile tool that formally establishes a relationship
between two parties
 Defines roles, responsibilities, and consequences for
non-compliance
 Specifies terms like payment structure, delivery
timelines, and product specifications

2: Service Level Agreement (SLA)
 Defines the standard of service a client can expect from
a provider
 Includes performance benchmarks and penalties for
deviations

3: Memorandum of Agreement (MOA) and Memorandum
of Understanding (MOU)
MOA
 Formal, outlines specific responsibilities and roles

MOU
 Less binding, expresses mutual intent without detailed
specifics

4: Master Service Agreement (MSA)
 Covers general terms of engagement across multiple
transactions
 Used for recurring client relationships, supplemented
by Statements of Work

5: Statement of Work (SOW)
 Specifies project details, deliverables, timelines, and
milestones
 Provides in-depth project-related information

6: Non-Disclosure Agreement (NDA)
 Ensures confidentiality of sensitive information shared
during negotiations
 Commitment to privacy, protecting proprietary data

7: Business Partnership Agreement (BPA) or Joint Venture
Agreement (JV)
 Goes beyond basic contracts when two entities
collaborate
 Outlines partnership nature, profit-sharing, decision-
making, and exit strategies
 Defines ownership of intellectual property and revenue
distribution

26
Q
A