Why high-reliability organizations evaluate the threat potential of suppliers

Cyber attacks tend to penetrate the attack surface using one of just a few initial attack vectors:

  • Phishing e-mails (80%)
  • Abuse of trust relationships
  • Web application session hijacking

Sometimes the easiest way into a large and well protected organization is through compromising a trusted third-party, such as a key supplier with less secure practices. If you are really good at security awareness, application security and network segregation, it may be easier to exploit your trust with a supplier instead. How do the best in class organizations deal with this type of risk?

20150424_155646090_iOS

Your internal security practices may be good – but how does that help if an attacker can abuse a trusted supplier with less degree of organizational hardening to gain access to your systems? Supplier qualification is a key risk management activity – also in the cybersecurity domain.

Qualify your suppliers

Every professional procurement organization already does supplier qualification. They tend to ask for ISO 9001 certification (quality management), they do credit and financial solidity check (you don’t want your supplier to go bankrupt before delivering the crucial goods), and so on. And those organizations that are the most security-aware include security related checks in this process. A quick informal survey on Twitter shows that most people don’t do this (and the result is quite biased – most of the respondents here are IT pros, not “normal people”). A whopping 44% says that they don’t have any process for evaluating the security implications of their supplier selection!

What factors to consider?

There are many ways to qualify a supplier. You might want to do a full due-diligence audit, require ISO 27001 certification, and so on – but then it will most likely be very hard to procure goods as most suppliers don’t have this mature processes in place – unless you deal in very special markets. So what should you have a look at, at the initial state? Here’s a quick list of some important factors:

  • The business sector(s) the supplier is active in. The sector may be of interest to some actors, and loss so to others.
  • The size of the firm. The medium sized businesses tend to be the ones most often targeted by cyber attacks. Smaller to a lesser degree but they often have very weak controls. Large enterprises are less attractive targets because they typically have better controls.
  • Political risk: is the company heavily involved in business relationships in regions with high political risk? Studies indicate that companies in countries with a higher degree of political risk are attacked more frequently than those in more politically stable regions.

Creating criteria based on these factors should give you some relevant hooks to use for supplier qualification. Depending on the nature of procurement you may choose to disqualify a supplier, to introduce more controls in the contract if the risk is perceived as higher, or also to do a more in-depth review before making a decision (such as asking to review their policies, etc.).

The outcomes of doing this in a reasonable manner are:

  • Better risk management for your firm – reduced likelihood of being stung by the third-party bee
  • Driving security culture at your own firm, tying security practices to business workflows in an obvious way, thereby making benefits less mysterious
  • Helping suppliers become more security-aware and resilient – thereby creating shared goodwill that will strengthen the supplier relationships

One thought on “Why high-reliability organizations evaluate the threat potential of suppliers

  1. Trust in business is trust in the security of those you do business with – safecontrols

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s