The first article in this series explained the importance of involving security in the procurement of third-party software applications as a first practical step towards ensuring the safety of critical data assets within your organisation. This article will share the 3 key benefits of this approach.

1. An appropriate third-party risk assessment will be conducted

As part of their due diligence, security will carry out an exercise to analyse the risk introduced to your organisation by a third-party vendor. This assessment evaluates the vendor to identify security risks the relationship your business could be exposed to, as well as risks associated with privacy, reputational damage and business continuity.

Risk assessments can take various forms: from the technical (penetration tests, technical audit and vulnerability scans) to more qualitative methods such as questionnaires and a review of the third party’s security certifications, processes and reports. Security ownership of the assessments can help ensure that not only the right methods are used, but that third parties are also benchmarked against up-to-date industry best practices.

Involving security in procurement means the third-party risk assessment approach will be proportionate to the level of data security risk

While every external relationship should be scrutinized, it’s important to balance the level of due diligence against the desired speed and cost of the decision to proceed. A security team will consider the type of data access, cyber risks, online exposure and business criticality of third-party software when defining the approach.

A video editing application, for example, might warrant a simple questionnaire and a review of the developer’s security accreditations. On the other hand, a bespoke CRM system set to have extensive access to your customer’s information may require use of one of the many dedicated TPRM platforms on the market.

2. Security requirements will be contractually mandated

While the importance of getting things in writing is common knowledge, third-party contracts often contain vague security requirements – or none at all. It’s not enough to simply hold a vendor to ‘keeping your data safe’; involving security in procurement will ensure a detailed security plan is laid out in black and white.

That’s not to say you need to demand a virtual Fort Knox. Security expectations should simply be aligned to your own organisation’s (as well as any external regulations), and so it’s important to grant a vendor visibility of all the relevant policies which will enable them to provide the necessary evidence of compliance.

This principle extends to security processes: How is application security monitored within your business, who is accountable and are you following your own rules? All these questions need to be answered before a vendor is upheld to a monitoring process in the procurement contract.

For the most critical third-parties – those where a data breach would result in disastrous business disruption – a comprehensive Security Assurance Plan should be defined and agreed upon in the contract.

What are key elements for a Security Assurance Plan?

What are key elements for a Security Assurance Plan?

Ultimately, the contract can be as detailed as it needs to be when it comes to security. It might include the need for specific access control within an application, defined as an (often overlooked) non-functional security requirement. Where development or customisation is involved, it’s important to agree on strict governance around any sensitive data shared with the vendor during the development process.

How can organisations protect sensitive sample data shared with a vendor for the purposes of software development?

Source: Considerations for Sensitive Data within Machine Learning Datasets (Link)

3. Fourth party risk won’t go unnoticed

Risk, simply put, is contagious. Data breaches might not originate via one of your direct vendors, and instead through a third party’s own supplier network. If not properly defended against, an attack on data assets can spread through an entire ecosystem of interlinked organisations with disastrous consequences.

Where procurement teams might stop at evaluating risk associated with the supplier, a security team will take the extra step of examining the fourth party risk landscape. A vendor should provide visibility of all its own suppliers, as well as convincing evidence these are vetted to a level of rigour in line with your own organisation’s approach.

The unfortunate truth is that many organisations don’t fully assess their third-party data security risk until it’s too late - and a breach has already occurred. Our next article offers guidance on how to approach this situation – and how to achieve long-term peace of mind that your critical data assets are secure.

Speak to our experts