Ensure Proper Security with Third-Party Suppliers

advertisement
Ensure Proper Security with Third-Party Suppliers
POWERFUL INSIGHTS
Companies are relying more and more on outsourced service
organisations to manage or store corporate data and support business services such as IT, human resources, legal,
marketing and facilities. Although there is a strong business
case for outsourcing processes, one area that cannot be
outsourced is the risks associated with the loss of data,
corporate branding, breaches in confidentiality, and failure
to comply with legal and regulatory requirements. These
factors become increasingly important because of growing
enforcement of regulations as data is transferred across
jurisdictions and the ability to govern risk moves beyond
country and corporate boundaries.
Ensuring the protection of information assets within outsourced services requires a security assurance lifecycle
from tender to service closure. The Ponemon Institute
recently released figures showing that the percentage of
incidents where a third party was responsible for a data
breach increased from 21 percent in 2005 to 44 percent
in 2008. The problem is growing, commensurate with the
general move to outsource services.
Issue
Any outsourced process relies on the provider having a
clear understanding of the client’s requirements. However,
for many clients, security requirements have been produced
over many years with the assumption that the client would
have complete control over the people, processes and tools
used to perform the tasks. Generally, the vendor will be
providing a leveraged service, and the security controls
applied to that service are standard across all clients. The
key challenge is whether these generally applied controls
are appropriate for the level of risk clients are willing to
accept. The security controls may either be too regimented
(thereby increasing cost and impacting functionality) or not
tightly controlled enough to meet expected requirements.
Such differences in expectations and requirements can
be formalised for the lifetime of the service if the contract
between client and vendor is not clear in defining the precise
security controls. Poorly defined contracts can lead to sig-
nificant difficulties for both client and vendor, and ensure
that neither party achieves value from the service.
Challenges and Opportunities
For the client, the main challenges are to ensure that
corporate security requirements are adapted for use in
an outsourced environment, ensure vendors are aware
of requirements, check that vendors have implemented
required controls, and receive information about the
effectiveness of those controls. Opportunities exist for
clients because, if implemented well, a standardised set
of requirements and due diligence mechanisms can reduce
risk, improve the efficiency of processes, and allow vendors to deploy leveraged people, processes and tools.
Vendors can face significant difficulties in ensuring they
provide appropriate secure services to their clients. Security
controls should be deployed to support business objectives as detailed in organisational policies and standards.
However, in a leveraged environment, controls have to
support all policies and standards required by all clients,
while also providing the cost efficiencies to allow clients
to realise a more cost-effective service than could be
provided in-house. Vendors need to demonstrate what
security controls are in place and help clients assess the
risks posed by any gaps.
Our Point of View
Clear, unambiguous security requirements designed for
outsourced processes, combined with a standardised due
diligence and reporting system, enable both client and
vendor to achieve the required business and security
outcomes from outsourcing. Security requirements are
dynamic and are likely to change as legal and regulatory
rules are updated and new threats and vulnerabilities
emerge. As such, a governance framework for managing
third-party relationships needs to be maintained and
flexible enough to ensure risks are being managed appropriately over time.
PROVEN DELIVERY
How We Help Companies Succeed
Example
Protiviti provides a wide suite of outsourced security
process consulting services, covering all aspects of vendor management from engagement and service fulfilment
through to disengagement. We have successfully helped
our clients meet these challenges in three key areas:
Our client is a credit card provider that makes use of thirdparty suppliers globally to support numerous business
activities and services. Sensitive data and critical business
processes may be entrusted to third-party vendors. We have
performed a number of vendor management services for
this client, including:
• Defining and communicating security requirements –
Ensuring clients are able to articulate their security
requirements clearly to outsourced vendors.
• Providing ongoing third-party assurance – Delivering
a due diligence programme for third-party suppliers and
vendors to ensure client security requirements
and expectations are met.
• Third-party solution assurance – Acting as a trusted
independent bridge between vendors and clients to
ensure new solutions and services have client security
requirements included from the specification stage.
Benefits we have helped our clients to achieve include:
• Cost-effective and repeatable security assurance –
Our clients are able to verify to parties that outsourced
services comply with required security and privacy
standards such as PCI-DSS and ISO 27002.
• Reduced sourcing costs and added value – Our clients
are able to build standard external requirements documentation. This can greatly reduce costs of time and
people associated with negotiating security controls
with each individual vendor.
• Process improvement and efficiency – We use proven
process and risk methodologies. This ensures the
security management of outsourced services is as
efficient and effective as possible.
• Developed a documented and repeatable engagement
process within the sourcing department and security
group to ensure that new and existing third-party
suppliers are assessed in a consistent manner that is
aligned with the risk they pose to the organisation.
• Developed questionnaire for vendor due diligence
reviews that focuses on eight key areas of information
security risk: logical access, physical security, disaster
recovery, information security management, letter shop,
telemarketing, data protection and business practices.
• Jointly developed a risk matrix for scoring answers to questions commensurate with the client’s appetite for risk.
The client has realised a number of key benefits from
engaging us:
• Documented and repeatable process defined and
implemented.
• Vendor due diligence carried out globally in a consistent,
cost-effective and independent manner.
• Ability to supplement security team responsibilities and
enabling them to focus on other high-risk priorities.
• Reports produced were understood by senior management and technical teams alike.
Contacts
Jonathan Wyatt
+44.207.930.8808
jonathan.wyatt@protiviti.com
Ryan Rubin
+44.207.389.0436
ryan.rubin@protiviti.co.uk
About Protiviti
Protiviti (www.protiviti.com) is a global business consulting and internal audit firm composed of experts specializing in risk, advisory
and transaction services. The firm helps solve problems in finance and transactions, operations, technology, litigation, governance,
risk, and compliance. Protiviti’s highly trained, results-oriented professionals provide a unique perspective on a wide range of critical
business issues for clients in the Americas, Asia-Pacific, Europe and the Middle East.
Protiviti has more than 60 locations worldwide and is a wholly owned subsidiary of Robert Half International Inc. (NYSE symbol: RHI).
Founded in 1948, Robert Half International is a member of the S&P 500 index.
© 2009 Protiviti Inc. An Equal Opportunity Employer. PRO-1009-107075
Protiviti is not licensed or registered as a public accounting firm and does
not issue opinions on financial statements or offer attestation services.
Download