How Can We Help?

Section 10 – Third Party Vendor Risks

You are here:
< All Topics

CompTIA IT Security Course

Section 10

Third Party Vendor Risks

security risks to an organization that can result from external entitites

supply chain risks – supply chains can serve as an open door into an organization!

supply chain attacks – hw counterfeiting, chipwashing etc

vendor assessments, how to evaluate a vendor and how to conduct audits

vendor selection and monitoring

contracts and agreements – what they should include for this

SLAs
MOUs
NDAs
BPAs etc

 

hw manufacturers: there is often a chain of different manufacturers and suppliers involved in producing them… any weak link can comprimise the hw!

purchasing hw from secondary sources – this increases the risk of tampering or malware, trojans, backdoors etc.

software providers – also integral parts of the supply chain and has to be checked, anti virus, authenticity etc. open source can be safer, but still has to be scanned. Proprietary sw should also be checked and scanned.

service providers – and managed service providers or MSPs:

 

Supply Chain Attacks

adversaries may attack weaker links in the supply chain to get into your organization – eg switches, etc

counterfeit hw eg chipwashing, substituting a chip in a hw device with a counterfeit bugged chip…

root kits getting in via supply chain suppliers…

big risk for companies and govt organisations

 

Vendor Assessment

Vendors, the sellers

Suppliers – hw producers and s/w developers

Managed Service Providers – they are external service businesses who specialise in managing parts of your internal IT system

Vendor Due diligence: ask, what are their own precautions?

regular monitoring and audit of vendors essential

independent assessment – can provide information

contractual arrangements

use penetration tests to see if a vendor or supplier is safe

when reviewing the contract with the vendor or supplier, ensure there is a right granted to perform a penetration test on them for example

– important else running a pentest without this could be construed as attempted cracking/hacking.

Supply Chain Analysis – would scrutinise every link in the supply chain of a vendor etc.

Vendor assessment, contract review, pentest are all essential for this.

TIP:

Dont permit incoming proposals from vendors or external sources, initiate them yourself… like calling for a taxi in third world country! Call it yourself, dont get into one that just drives up to you at the kerbside! = safer.

 

Feedback looks, 2 way communic, where customer and vendor share info with each other. They are valuable for security and risk minimization.

 

Contracts and Agreements:

all business rels operate on basis of contracts

types:

basic:

formally estabs rel between both parties.
eg payment structure, delivery expectations, the service or product etc

SLA Service Level Agreement : used to define standard of service for a non tangible ie service

Memorandum of Agreement / Understanding:

MOA: is more formal, sets out roles and resps of each partner

MOU: less binding more declaration of mutual intent. Might be used initially before an MOA

 

MSA: Master Service Agreement: a top agreement, further agreements then refer to this

SOW: Statement of Work, sets out details of a particular project

NDA: non disclosure agreement: agree to keep info private and confidential to both parties only

 

BPA: Business Partnersship Agreement

2 entities pool their resources for mutual benefit

sometimes called a Joint Venture Agreement

 

 

 

 

 

 

 

 

 

 

 

 

Tags:
Table of Contents