Latest Report: The Gartner® Market Guide for IT Vendor Risk Management Solutions
Driven by the recent spate of software supply chain attacks, the United States Senate recently passed a bill aimed at improving cybersecurity training for federal procurement personnel. The Supply Chain Security Training Act will require agencies to assess and mitigate supply chain risk throughout the acquisition lifecycle. When enacted into law, the bill will require the Department of Homeland Security, NIST and other federal agencies to coordinate on the details and enforce the program. There is also a similar bill before the House of Representatives.
Prevalent believes that tighter cybersecurity provisions are essential to strengthening supply chain risk management, and we suggest all organizations – not just federal agencies – consider implementing the following best practices.
To reduce the likelihood of a third-party software supply chain disruption, require solution providers to share information about their software development lifecycle, including:
While you can gather the above information using a questionnaire-based assessment, remember that assessment responses are typically accurate only for a specific point in time. It’s therefore important to augment your supplier assessments with continuously updated vendor risk data from sources including:
By monitoring these intelligence sources, you gain current visibility into whether a potential supplier has been, or could be, exploited. As a result, your supplier risk assessments become less static and more dynamic.
However, beware of building a risk monitoring program that is overly complex and expensive. With hundreds of potential sources of cybersecurity and reputational intelligence to choose from, it’s easy to quickly become overwhelmed with uncorrelated data from disparate, separately licensed sources.
Look for platforms that centralize inputs from multiple intelligence sources, use the findings to validate assessment results, and provide meaningful reports on which vendors present the most significant risk exposure.
Navigating the Vendor Risk Lifecycle: Keys to Success
This complimentary guide details best practices for successfully managing risk throughout the vendor lifecycle. See what we've learned in our 15+ years of experience working with hundreds of customers.
The further upstream you go in your supply chain, the less visibility you have. This can present problems when your organization is faced with the prospect of ransomware attacks and security breaches. Gaining visibility into your extended vendor ecosystem can reveal relationships where your data is handled, but this information can be time-consuming to gather and quickly outdated.
To overcome this challenge, use a third-party assessment platform to build comprehensive vendor profiles that include key vendor information such as location, fourth parties, and deployed technologies – complemented with information from external supplier perimeter scanning. The outcome will be a relationship map that easily identifies technology concentration risk, so you’ll be better prepared when the next SolarWinds happens.
When a large-scale software supply chain breach occurs, the natural first question to ask is, “Are we impacted?” followed quickly by, “Are our third parties impacted?” We saw this scenario play out several times in 2021 with breaches such as SolarWinds and Kaseya. Having comprehensive vendor profiles, as described in best practice above, will put you in a great position to quickly answer that question.
However, when it comes time to determine a vendor’s exposure and mitigation plans, many organizations are left flat-footed – using spreadsheets to assess and triage risks across potentially hundreds of supply chain partners.
Here are a few steps for taking a smarter, faster approach to incident response:
Taking a manual, reactive approach to third-party software vulnerability detection and incident response will only increase your likelihood of a business disruption. Instead, implement the three best practices in this post to be better prepared for your next supply chain security challenge.
For more on how Prevalent can help reduce supply chain risk at every stage of the vendor lifecycle, read our white paper Navigating the Vendor Risk Lifecycle, or request a demo for a strategy session today.
If vendor threats and regulations are leaving your team feeling overwhelmed, then consider these benefits of...
03/14/2023
Follow these 7 steps for more secure and efficient offboarding when third-party relationships are terminated.
03/06/2023
Learn strategies for mitigating risks stemming from cyberattacks against your IT vendors.
02/15/2023