Related Posts
Subscribe via Email
Subscribe to our blog to get insights sent directly to your inbox.
Third party security assessments are a crucial part of any information security risk management program. Conducting ongoing security assessments of your vendors will give you clarity on the risks you may be inheriting from them. The first step in any vendor security assessment program is to identify your key partners. Identifying key vendors for your vendor management program can be full of uncertainty and time consuming. How should you begin?
The third parties you should focus on are entities that store or have access to your company’s data. You would also want to consider third parties that have access to your network or IT infrastructure. Here are some processes and techniques to help you get started in identifying your third parties.
One of the first places to start is to create a data inventory. Creating a data inventory will identify the systems, applications, and processes that involve certain types of data. Start with a type of sensitive data such as personally identifiable information (PII), HIPAA data, or a specific data element such as phone numbers. Here’s a helpful whitepaper that explains the fundamentals of creating a data inventory: “Creating a Data Inventory: The First Step In Managing Privacy and Data Security Risk” by David Manek, Bruce A. Radke, and Michael J. Waters.
Take your data inventory to the next level by creating a data flow diagram. This diagram should be based on a business process or data type. A data flow diagram can help you identify the following:
Reviewing your current contracts and agreements could help you identify the following:
You likely have employees that are experts in certain IT systems or business processes. A short interview with these employees may help you understand a vendor’s role in the process. The SME may also be able to assist you with data mapping and inventory.
Conducting an Access Review of system accounts is one of the quickest ways to find external entities that already have access to your data. Most systems are able to generate reports that will tell you the level of access and privileges that certain users have. This method should be used with some of the other identification methods since it will not identify vendors that have external access to your data.
So, now you have a list of all your third parties, the next step is to conduct a risk assessment. Conducting a risk assessment will help you determine which vendors pose a higher-level risk to your business and customers. These are the vendors that you will want to assess first and on an annual basis.
Hopefully these methods of identifying third parties will help you establish an effective vendor risk management program. Conducting regular assessments on higher risk third parties will help you identify and manage the potential risks they pose to your organization.
Brianna Blanchard is the Senior Manager of Information Assurance and Advisory Services at NuHarbor Security where she leads a team of professionals. She has over 15 years of experience working in cybersecurity and information technology. Before joining NuHarbor Security, Brianna worked for government organizations helping them build their security compliance and governance programs from the ground up. Brianna currently is involved in co-leading the Women in Cybersecurity Council at Champlain College, with the goal of making cybersecurity more inclusive and Champlain College the best place for women in cyber.
Subscribe to our blog to get insights sent directly to your inbox.