Perimeter
11/26/2011
12:02 PM
Commentary
Commentary
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Partner Management: Compliance Program Is Essential

Understanding the risk associated with a partner relationship and managing it accordingly is key

If you look at almost every regulation or contract, from HIPAA to state privacy laws to PCI DSS, every one has provisions for managing partners that have access to protected data. However, many organizations new to compliance (or with immature compliance programs) have a difficult time determining how to “manage” their vendors.

The key to effective management of vendors is to understand the risk that each vendor poses, and to manage that risk over the long term. This means assessing risk, establishing controls, and monitoring the effectiveness of the controls periodically for the life of the relationship.

Regulations require organizations to monitor the state of the relationship and take responsibility for the practices of the partner. These relationships require assessment, legal agreements, and regular communication. At the heart of this practice is the idea that organizations need to view a breach at a partner as just as dangerous as a compromise in their own enterprises.

The first step in effectively managing partners is to understand what data is shared with a partner and to determine the inherent risk. The inherent risk is the worst-case scenario in which the data is compromised. This means imagining the compromise without factoring in the likelihood of it occurring. Understanding inherent risk allows an organization to understand the criticality of the vendor and determine to what degree it should invest in analyzing its security practices and protecting the data.

Once you understand the data shared, you should ask yourself whether all the data needs to be shared. Sometimes this analysis and some creative thinking can eliminate sensitive data fields and substantially reduce the risk of compromise. However, it could be that critical information needs to be shared. If so, you’ll need to ensure that the organization is going to protect the data in a compliant manner.

If the data is extremely sensitive (e.g., includes Social Security numbers, protected health information, or payment card data), you will need to find a cost-effective method for analyzing the vendor’s security and compliance controls. The options are to conduct your own assessment, contract someone to conduct an assessment, or trust someone else’s assessment.

In a future post, I’ll describe ways to assess whether the vendor is capable of meeting your requirements and the pros and cons of various assessment methods. The important point to remember is that you need to be confident that the vendor’s business model, technical controls, and legal commitments will allow you to comply the particular regulation or regulations that require you to protect the data.

Richard Mackey is vice president of consulting at SystemExperts Corp.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2336
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 and FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2334 and CVE-2014-2335.

CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.