Let us begin by describing how to approach Cyber Supply Chain Risk Management (C-SCRM) and the risks your vendors pose to you. Then we will discuss if you should require them to show evidence that penetration testing was conducted and what remediations were taken.
C-SCRM in a nutshell
For simplicity let us split suppliers into three tiers: Tier 1, Tier 2, and Tier 3. We can use the following parameters to construct a function to determine where they fit: volume and sensitivity of data they hold on our organisation, the connectivity they have to our networks and compliance requirements.
Then we need to discover the cyber posture of these vendors (Are they ISO compliant? Do they regularly get tested? Are they Cyber Essentials certified?), and depending on which tier they fit in, we will come up with a risk rating for that supplier. A risk matrix could look as follows.
As an organisation, let us assume we would only accept a cyber risk score of 3 or below for our suppliers. This would mean that for Tier 3 suppliers, we would not even bother to measure their cyber posture as it would be an unnecessary time investment. For Tier 2 suppliers, we would need to ensure that they follow a moderate security posture (i.e maybe Cyber Essentials certified?). And finally, for the Tier 1 suppliers, we would need to verify that they take cyber security very seriously.
As a result, it is important to note that our organisations would prefer having lower Tier suppliers wherever possible, therefore as an example, only provide them with the connectivity they absolutely require.
Risk posed by vendors
Your vendors may provide you with products that are within your corporate networks, design and/or host web applications for you, or they might be delivering a larger managed service. From an attacker’s perspective compromising these hosts/applications, would be considered acquiring a foothold within your estate. These tend to be your Tier 1 suppliers as a result, they should be scrutinised in greater detail.
A trend is appearing, to “island hop” from a MSPs to target networks. Island hopping involves targeting a trusted relationship you have (a vendor, a partner, a client etc…) to gain the initial foothold on your network (i.e abusing the trust relationship). This happens more often than you would think, indeed, according to Carbon Black “half of cyber-attacks today leverage island hopping.” This approach is not new, indeed Chinese threat actors were responsible for a large campaign targeting MSPs beginning in late 2016. And recently, the SolarWinds hack has brought this risk to mainstream news (albeit poorly explained).
When to require proof of penetration testing?
This is a difficult question to answer, and it depends on the risk level of your suppliers and what type of service/product they provide you, but below are two points to keep in mind:
- Often when companies request a penetration test, their supplier will issue a final report after the remedial work has been conducted so that their clients do not see the initially discovered vulnerabilities.
- You can set in your SLAs with your vendors to see the penetration testing report directly from the supplier. You can also set within the SLAs a list of approved suppliers to pick from (under the CREST banner for instance).
Need assistance with your Cyber Supply Chain Risk Management (C-SCRM)?
Risk Crew offers a scalable solution that is fully customisable to meet your specific risk objectives. It can be designed and deployed within your existing business’ supplier management processes or platforms or automated and fully outsourced to Risk Crew for management.
Learn More About C-SCRM Download the Service Overview