Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

Don’t Forget to Manage Supply Chain Risk

Performing a Vendor Risk Management Process as Part of Normal Business Operations is an Important Step in Securing the Supply Chain

Performing a Vendor Risk Management Process as Part of Normal Business Operations is an Important Step in Securing the Supply Chain

Adobe recently warned customers that attackers had illegally accessed source code for several of its products. This is only one of many examples, in which hackers are mounting targeted attacks against an organization’s supply chain. As companies improved their defenses against direct network attacks, hackers shifted their focus to the weakest link by exploiting the supply chain to gain “backdoor” access to IT systems. As a result, enterprises need to monitor and manage IT security risks downstream in the supply chain.

One of the most damaging and memorable supply chain attacks to date remains the RSA SecureID token breach. Using stolen data about the company’s SecurID authentication system, criminals were able to compromise RSA customers including Lockheed Martin that rely on SecureID tokens to protect their most sensitive data and networks. In another example, 300,000 Verizon customer records were posted on the Internet. A forensic investigation later revealed that none of Verizon’s systems were breached, but that the data had been stolen from a third-party marketing firm that was part of the company’s supply chain.

Supply Chain Cyber SecurityPreventing supplier vulnerabilities from placing your organization at risk is difficult. It encompasses performing risk assessments associated with information sharing, threats related to unsanctioned services and technologies used in daily business operations (e.g., social media platforms, productivity tools such as Evernote), and application vulnerabilities.

When it comes to sharing information with suppliers and the management of associated risks, a recently released report by the Information Security Forum (ISF), an international association that focuses on cyber security issues and information risk management, notes that while “sharing information with suppliers is essential for the supply chain to function, it also creates risks.” Furthermore, the report reveals that “of all the supply chain risks, information [sharing] risk is the least well managed.” In fact, when it comes to assessing information sharing risk, most organizations focus only on a small subset of their suppliers, typically based on contract size.

This practice is clearly outdated, considering the fact that cyber criminals are using the supply chain to access data from large, well-protected global organizations they wouldn’t otherwise be able to compromise. In response, organizations need to extend their practice of conducting regular risk assessments to include all of their suppliers, and – if possible – even supplier’s suppliers. Performing vendor risk assessments has become a very popular practice over the past 12 months. While gathering data about a supplier’s business and information security practices provides some peace of mind, it doesn’t guarantee a higher level of security, especially if a vendor stretches the truth a bit.

Nonetheless, performing a standardized vendor risk management process as part of normal business operations is an important step in securing the supply chain. Unfortunately, by including all suppliers in manual questionnaire-based risk assessments, organizations quickly reach limitations as it relates to operational efficiency and scalability. To avoid having to hire legions of contractors or full-time staff, organizations are turning to software to help automate the data gathering process and calculation of risks scores. Specifically, Vendor Risk Management tools are being used by more and more organizations to address the information sharing risk component of overall supply chain risks.

This leads us to the next attack vector in the supply chain: vulnerabilities of authorized or unauthorized technology deployments.

Vulnerability management has long been a required preventive measure. However, trends such as the consumerization of technology, “bring your own device” (BYOD), and emerging regulatory mandates that prescribe more frequent testing are pushing vulnerability assessment processes to their breaking point. In today’s fast moving threat environment, vulnerability management deployed as a stand-alone discipline that does not apply risk-based metrics for ranking and prioritizing of remediation efforts may well be the Achilles heel of cyber security.

Advertisement. Scroll to continue reading.

The biggest inhibitor of effective vulnerability assessments lies in the fact that the number of vulnerabilities in organizations has grown exponentially over the past few years. This is largely due to the increasing number of IT assets under management, which are creating a big data challenge.

Many organizations have the data required to implement a more streamlined vulnerability management process. However, sifting through all the data sets, normalizing and de-duplicating the information, filtering out false positives, aggregating it, and finally deriving business impact-driven remediation actions is a slow and labor-intensive process.

The emergence of Integrated Risk Management systems is taking vulnerability management to the next level. They combine risk intelligence, using big data that is gathered and correlated from security operations tools, with automated remediation that establishes bi-directional workflows with IT operations. These systems drive operational efficiencies by automating continuous monitoring and ticketing to remediate only business critical risks. Using this automated approach, organizations can free up IT and security personnel to focus on critical tasks and turn their security technicians into risk strategists.

Based on the increased risk posed by vulnerabilities in third-party technology, organizations are also starting to turn the table on their suppliers. Instead of using their own security operations teams to assess potential vulnerabilities, some companies are mandating suppliers to use independent verification services to test software applications prior to procurement and deployment.

Written By

Dr. Torsten George is an internationally recognized IT security expert, author, and speaker with nearly 30 years of experience in the global IT security community. He regularly provides commentary and publishes articles on data breaches, insider threats, compliance frameworks, and IT security best practices. He is also the co-author of the Zero Trust Privilege for Dummies book. Torsten has held executive level positions with Absolute Software, Centrify (now Delinea), RiskSense (acquired by Ivanti), RiskVision (acquired by Resolver, Inc.), ActivIdentity (acquired by HID® Global), Digital Link, and Everdream Corporation (acquired by Dell).

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...