How to Protect Your Data from Third-Party Breaches
The December 2013 Target data breach that compromised the credit card information of 40 million customers was the first of many wake-up calls to organizations, bringing home the damage a company can sustain when a partner’s systems are hacked. As the whole world now knows, the HVAC supplier had access to more of Target’s systems than was needed or intended, and hackers infiltrated Target’s network through the partner's own vulnerable solution.
Sadly, Target is not the lone case. More recently, 15,000 Boston Medical Center patients’ personal information and the payment card details of 868,000 Goodwill customers were compromised through data breaches at vendor companies with access to the organizations’ systems. In fact, a recent PwC study found the biggest challenge to security today is from internal sources – employees and partners – not external threats.
Vendors often need remote access to maintain your internal systems, but they may not be as stringent about security processes as your chief security officer, CIO, or IT team. For example, partners' systems may use software that a developer no longer supports, and is hence, vulnerable. Even worse, they may use the same administrative passwords across every customers’ systems.
All this translates into the need for a far more comprehensive information security risk management strategy — one that not only oversees your data, but also third-party access rights, the robustness of network defenses, and more.
Here are some best practices to help protect your network from third-party data breaches:
Be aware of what your vendors can remotely access. Understand what kind of data and which systems your vendors can access, and the levels of access they enjoy. Can they retrieve any critical data they do not need for their work? Or do they have access only to the resources necessary to perform their jobs? This is of particular importance when you work with infrastructure management partners, for instance, because these have privileged access that could pose a significant threat if not properly secured. Provide access to data and systems only on a need to know basis.
Standardize remote access methodologies. The proliferation of available remote access methodologies (WebEx, web conferencing tools, and virtual private networks, for example) makes it difficult to monitor and manage access controls. Simplify this and better manage connections made to your network by defining the specific methodologies you will allow.
Use stronger authentication. Insist that vendors who must access your environment use two-factor authentication and institute well-defined access control processes.
Segment your network behind firewalls. It is advisable to allow vendors access only to a specific segment of the network, with this segment being firewalled from others. Network segmentation can limit the damage from a third-party data breach. To make this even more effective, provide dedicated systems for vendors, so they do not use their systems to connect to your network.
Monitor network defenses frequently. Frequently audit access controls and security policies to identify potential security gaps that can be plugged before a breach occurs. Real-time analyses allow your IT department to see what is being accessed by whom and why, as your vendors connect to your network. This helps proactively identify any problematic activity.
Hold vendors to the same security standards you hold yourself. However stringent your organization’s security system, all is nullified if your vendors are not equally particular. Define your security requirements upfront when signing on a new vendor. Review their security processes and access control policies, and check if they conduct regular penetration testing on their systems and network. Insist they adhere to the same standards as your organization in the areas of data protection, identity management, authentication, and other security measures.
Proactively plan for third-party breaches. You will (or should) already have a robust incident response and disaster recovery plan for attacks on your own systems. Take this a step further by planning a defense against third-party attacks as well. Ask your vendors to demonstrate how they protect your data, their incident response plan, and how they will deal with breaches that can affect your data.
Periodically verify your vendor’s security posture. Security assurance is not a one-time task but a continuous process. Conduct periodic audits of your vendors to make sure that they follow best practices and have the necessary technical controls in place. The aim should not be to review every vendor you engage, but to conduct a thorough audit with greater frequency for targeted, high-risk vendors.
In this, as in other aspects of your relationship with your vendors, work with partners to identify security gaps and protect against breaches before they occur. Industry standards are gradually evolving to this end as well. The latest version of the Payment Card Industry Data Security Standard (PCI DSS 3.0) mandates that organizations pay closer attention to partners' security practices. This will probably provide the much-needed nudge to get businesses to think beyond only their own security posture.
About the Author:
Prasenjit Saha is CEO, Infrastructure Management Services and Security Business, at Happiest Minds. Prasenjit brings with him over 23 years of management experience in global markets. Before joining Happiest Minds, Prasenjit worked as vice president, SBU/Profit Center head for the Enterprise Security Solutions division of Wipro Technologies where he was responsible for strategy, sales, business development, solution development, delivery, operations, and P&L for the division for nine years.
Prasenjit started the Wipro Security division in 2004 and scaled it up to the third largest global security service provider with more than $200 million in business. During this period, the division witnessed more than 65 percent year-over-year growth across more than 140 Fortune 1000 companies. Prior to joining Wipro, Prasenjit worked as a senior technical manager in the Process Automation R&D unit at ABB till 1997. Prasenjit started his career in 1991 in the defense electronics division of BHEL working as an R&D Engineer developing SCADA and software simulation products and solutions.
Prasenjit holds a B.Tech (honors) degree in electrical engineering with specialization in automation and control from Indian Institute of Technology (IIT), Kharagpur. He is an active member of multiple infrastructure and security advisory forums. Follow him on Twitter at @PrasenjitSaha11 or @happiestminds