Taking steps to secure your organization and communicating to your stakeholders is no small feat. As you level up your organization’s Information Security program, it is important to consider how all of your suppliers likewise support your business and protect your data.
While attributed to former President John F. Kennedy, it is not clear who first said a “rising tide lifts all boats” but the aphorism certainly applies to the world of Information Security and Third Party Risk Management (TPRM). The concept of TPRM is a form of risk management focusing on identifying and reducing risks related to third parties. These third parties could be suppliers, vendors, partners, contractors and/or service providers. Any third party that receives the confidential data of your organization or a company that your business relies on should be reviewed in a manner that identifies the risk of conducting business. To put it another way, a business with an Information Security Management System (ISMS) that also has a business continuity/disaster recovery/IRP plan can be relied on to deliver whereas a company that does not will inevitably suffer downtime and even the risk of losing your confidential information.
Steps to build out a TPRM program
- Identify
- Start by identifying all of the third parties, vendors, partners and tools used by your organization.
- Define, classify and prioritize
- Data types (Confidential, PII, HIPAA, GDPR)
- High, medium and low risk categories of vendor
- Data location stored externally, internally or software installed in house
- Third parties crucial to production/sales
- Frequency of ongoing reviews, annually, bi-annually, one-time onboarding assessment
- Assess risk
- What information do the third parties have and where is it stored
- Identify stakeholders and owners
- What risk matters to the organization
- organizational, compliance, reputational, financial and strategic
- Determine the security frameworks and regulatory requirements
- Assess risk on individual third parties
- Utilize technology
- Automate processes
- Monitor for ongoing risks/incidents
- Offboarding third parties
- Removing access
- Deleting, returning data
A proper TPRM program is an inventory of the partners that have or use your data and how they perform those tasks. Regardless of the maturity or scope of your program, you should also take in to account fourth party relationships or, the third parties your vendors use to perform business functions. Common fourth parties are data/colocation centers such as AWS, Azure and GCP.
In the next article, we will look in to securing an Office 365 environment with some simple scripts and best practices that are cost effective.