Wednesday, August 6, 2014

Third Party Risk Management: Attestations

Third Party Risk Management:  Attestations

Third party risk management is an area of increasing concern for most organizations today.  The growing adoption of IT services provided by third parties, combined with stricter regulatory and compliance requirements for managing third party risks, as well as the increasing publicity of attacks resulting from third party risks is causing most organizations to review their third party risk management programs.  There are many facets to managing third party risks, but one area that I will cover in this article is third party security attestations.  Some day, we will get to a point where service providers have implemented continuous monitoring, and are able to share the near real time information about the security of their service with customers.  However, we aren’t there yet, and organizations that need to assess the risk of using a third party will likely have to rely upon some type of attestation.

There are various types of attestations that an organization can provide to explain the information security program that protects the confidentiality, integrity and availability of the service (including the customer data stored, processed or transmitted) provided to customers.

In the simplest case, a service provider can make a simple statement “we have a strong security program”, however, as an attestation, this has very little value, and organizations would be wise to avoid accepting such statements.  To have credibility, the attestation should come from an independent third party rather than the service provider.  The need for this independent, third party attestation has resulted in several programs such as ISO-27001 certification, SAS-70, SSAE-16,  SOC-2, and SOC-3.  Some people include the PCI DSS Report on Compliance (ROC) as a form of attestation, but because of the tight focus and scoping on payment card data, the PCI DSS ROC may not be adequate for many organizations, unless they are solely focused on the security of payment card data.

Let’s dig into some of these attestations a bit:

ISO-27001 certification

The ISO 27000 family of standards is focused on information security.  The core of the family defines an “information security management system” ISMS as the program necessary to ensure the confidentiality, integrity and availability of an organization’s information assets.  An organization can seek certification under ISO-27001 in which an approved auditing organization will validate that the organization has an ISMS that is compliant with ISO-27001. 
It is important to understand that if you rely upon a service provider’s ISO-27001 certification, all you will see is a one page piece of paper that states that the organization was certified by the auditing firm.  You won’t learn anything about the specific security controls that the organization has in place.  Still, it is an attestation that the organization has an ISO-27001 certified ISMS.  Note that ISO-27001 certifications are typically valid for three years, which is quite a long time in the dynamic world of IT.

SAS-70 and SSAE-16

Prior to the adoption of the Statement on Standards for Attestation Engagements (SSAE-16) standard and the Service Organization Control (SOC) reports, many service organizations relied upon the Statement on Auditing Standards Number 70, also known as the SAS-70, to provide a description of controls in place, and a third party audit of the suitability of the design of the controls to achieve the specified control objectives.
In June of 2011, the SSAE-16 standard replaced the SAS-70 standard.  The SAS-70 is a retired standard, and as such, it should no longer be used.
The SSAE-16 standard, a US based standard created by the American Institute of Certified Public Accountants (AICPA), was designed to be compatible with the international standard ISAE 3402, which was released in December of 2009.

SOC Report Types


SOC reports can be either a type I or type II reports.  The simplest way to explain the difference between the type I and type II reports is to examine the time period for which the audit examined the controls.

Type I Report

Type I report:  a point in time report.  From the AICPA web site: “report on the fairness of the presentation of management’s description of the service organization’s system and the suitability of the design of the controls to achieve the related control objectives included in the description as of a specified date.

Type II Report

Type II report:  a report covering a specific period of time, typically either six months or one year.  From the AICPA web site:  report on the fairness of the presentation of management’s description of the service organization’s system and the suitability of the design and operating effectiveness of the controls to achieve the related control objectives included in the description throughout a specified period.

Based upon these definitions, it should be clear why most organizations prefer a type II report from their service providers as opposed to a type I report.  Type II reports require that the audit team review evidence throughout the time period of the report to ensure the control’s implementation.  It would be much easier to complete a type I audit, as all you have to do is show that the control was in place on the day the auditor was present.

Note that because the Type II report is an attestation of the implementation of controls over a period of time, it is always a “look back” report, meaning that the report covers a period of time in the past.  It’s not possible to report on the presence of a control for a future time period.  Keep that in mind if someone asks “Why is this report for last year?” or “This is good but where is the report for this year?”.

SOC 1, SOC 2, SOC 3


As described above, there are type I reports and type II reports, but there are also three different kinds of SOC reports:  SOC 1, SOC 2 and SOC 3.

SOC 1

SOC 1 reports are based upon the SSAE-16/ISAE-3402 standards.  The SOC 1 report replaces the SAS-70, and is intended to evaluate controls over an organization’s IT systems that are material for financial statements.  It is not intended to attest to the controls related to general security, integrity, availability or privacy.

SOC 1 Reports are intended for a very limited distribution.  The report includes details about the controls that management has decided to report.  The report is typically classified as a confidential document and is not shared with external parties unless under terms of non-disclosure.

Because of the very limited focus of a SOC 1 report to IT systems that are material for financial statements, they are not generally speaking well suited for most organizations seeking attestation of a service provider's security for a given service.

SOC 2

SOC 2 reports are based on the AT-101 Trust Service Principals.  There are five TSPs:  Security, Availability, Confidentiality, Processing Integrity, and Privacy.  An organization determines which of the 5 TSPs are appropriate for its SOC 2 audit.  Some service provider organizations may include all five TSPs, while others may use a sub set of the TSPs.  Service provider organizations select the TSPs that they believe are most appropriate for the services they provide.  As a customer, or potential customer of the service provider, you should evaluate if the selected TSPs are appropriate for your use of the service.

In a SOC 1 report, the organization determines which the controls it feels are appropriate, and the accounting firm checks to see if the controls were in place over the reporting period.  The auditing firm does not issue an opinion about the appropriateness of the controls.  The SOC 2’s TSPs have defined criteria, and the audit checks to ensure that the control activities implemented by the service provider are adequate to meet the requirements of the Trust Service Principle criteria. 

Because the SOC 2 audit focuses on defined Trust Service Principle criteria, many people believe it is more appropriate for cloud service providers as an attestation of the service provider’s controls over their systems.  For example, in the Security TSP, one of the criteria is “1.0 Policies:  The entity defines and documents its polices for the security of its system.”  While not likely, it is possible to have a SOC 1 report that doesn’t include anything about security policies.

Like the SOC 1 report, a SOC 2 report is not intended for public distribution.  The report includes details about the controls in place to meet the principles and criteria of the Trust Service Principle(s).  The report is typically classified as a confidential document and is not shared with external parties unless under terms of non-disclosure.

The SOC 2 is widely understood to be the attestation of choice for cloud service providers.  The Cloud Security Alliance released a paper in February of 2013 stating that the SOC 2 is likely the best attestation for most users of cloud services.

SOC 3

The SOC 3 report is a short report that is intended for wide distribution.  It provides an attestation that the service provider’s controls meet the requirements to satisfy the stated Trust Service Principles.

In addition to a report, the SOC 3 seal is often displayed on the service provider’s web site, as a public statement of the provider’s achievement in meeting the requirements of the stated Trust Service.

The SOC 3 report does not provide information about the controls the service provider implemented to meet the requirements of the stated Trust Service Principles.

Summary

I hope this summary has been helpful.  Here are some short takeaways to remember:

  • SAS-70 is a retired standard that has been replaced by the SSAE-16 standard.  Let’s stop using the SAS-70 standard in contracts and other documents.  It’s been over three years, time to let it go.
  • ISO-27001 certification is a good indicator that an organization has an information security program, but you won’t learn much about the specific security controls that are used, and since the certifications are valid for three years, it isn’t very timely.
  • SOC-2 reports are most likely the most appropriate attestation report for a service provider at this time, although adoption by service providers is still lagging.  Part of the reason for this is that the switch from a SOC 1 to SOC 2 is often a multi-year process.
  • If your service provider hasn’t yet adopted the SOC-2, you should ask them when they expect to move to it.  It could take some time, but they should be moving toward the SOC-2.



Wednesday, July 30, 2014

Book Review: America the Vulnerable by Joel Brenner

America The Vulnerable, a book by Joel Brenner






Note:  I read this book a couple of years ago and wrote this review at that time.  I didn't share it then, so I've decided to share it now.  This is a review of the 2011 edition of the book.  I understand there is a revised edition that was released in 2013, but I've not read that edition yet.



This is a book that is equally interesting and terrifying at the same time.  As someone that works in the information security field, I had not considered the full impact to geo political stability resulting from the advances in information technology and the rapid growth of Internet connected systems.

The author’s description of how the overwhelming technological superiority of the US Military forces in the first Gulf war in 1991 stunned the world was somewhat novel to me.  As someone that participated in the conflict on the ground (I was a soldier in the 82nd Airborne division, part of the US Army’s XVIII Airborne Corps), I had not previously recognized the connection between the ‘91 Gulf war and cyber warfare.  The demonstration of the US Armed Forces advanced capabilities is explained as the catalyst behind Chinese and Russian cyber warfare development.  Realizing that they would not be able to defeat the US military in a conventional military conflict, the Chinese began to seek ways in which they could counter the significant military technological advantages of the US.  The standing doctrine of the time, overwhelming numerical superiority (in terms of soldiers), was realized to be no longer a compelling advantage in the face of the advanced technology of the US Military.

The book describes the development of cyber offensive capabilities as a way to disable an opponents ability to conduct military operations, and this is the point at which the book begins to become frightening in the description of the vulnerabilities of our western way of life.  The vulnerabilities in critical infrastructure for highly networked nations and the potential threats that could disrupt our way of life are truly scary.

But the technological advances brought about by networked information technology are not just threatening our critical infrastructure, they are also fundamentally changing the ability of nations to gather intelligence as well as “leveling the playing field” by bringing advanced capabilities that were once reserved only to wealthy nation states to groups with no specific national identity (“hacktivist” groups, organized crime, terrorist networks etc.)  

The fact is that much of our society depends upon private infrastructure which is now threatened by both foreign nation states and non state actors.   There is no government agency currently responsible for protecting private infrastructure; not the US Military, nor the NSA, nor the DHS.  This new era requires a new strategy.

The book concludes with some recommendations for both the government and private industry.

I enjoyed reading this book and hope you found this summary helpful.  I’d enjoy knowing your thoughts on this summary or the book if you’ve already read it.

Regards,

Andrew


Below you’ll find some excerpts from the book that I found particularly Interesting as well as some of my own thoughts from various chapter.


Chapter 4 Degrading Defense

page 81:  

“Policies regarding information systems that are not expressed technically are little more that blather.  No one pays attention.  If you don’t want people to be able to run unauthorized P2P on your system, you must design and build your system so that such software cannot be run, or that it pinpoints exactly where it is.  “

page 82:  

“...some of these penetrations are technologically shrewd, but often they target the weakest link in any computer system --  the user.  Defense workers, including in the military, are just as impatient with security practices and just as susceptible to phishing attacks as everybody else.  Like workers everywhere, they are also adept at subverting security rules and mechanisms designed to keep their systems healthy.  As we’ve seen repeatedly, when convenience butts heads with security, convenience winds even in war zones.”

Chapter 5:  Dancing in the Dark

This chapter describes the serious threat to public utilities, especially electricity.

US Power Generators are manufactured overseas.  Replacement generator procurement would take many months.

It is possible to cause physical damage to electrical grid components using computer systems.  Tests have shown that generators can be severely damaged or destroyed by manipulating their control systems.

Chapter 7:  June 2017

Historically, cyber war capabilities have been reserved to technologically advanced nation states, however, the rapid growth of technology and the amount of technological power that can be obtained by individuals is changing the balance.

page 154: 
“In a word, advanced network operations will cease to be the special province of a few advanced states.  Non-state actors, who cannot be deterred with threats of cyber retaliation, have crashed the party.”

page 156:  

“A nation that puts its faith in a potential adversary’s benign intentions rather than its own strength and capabilities is a nation that is psychologically and practically incapable of defending itself.”


Chapter 8:  Spies in a Glass House

Alleged Assassination of alleged Hamas weapons buyer in Dubai.  This seemed almost too much like a spy movie to be true.

Impact of technology on the ability to conduct a truly covert operation.

Wikileaks:  “a new era of “transparency”, forced upon us by non state actors.”

Chapter 9: Thinking about Intelligence

page 209:  

“Transparency exposes the government's secrets in the same way that it exposes corporate secrets and invades personal privacy - and for the same reasons of ready electronic access.  Electronic information is liquid, and liquid leaks.  Apart from the technology, our culture also disposes us toward transparency and inures us to the exposure of information that not long ago would have been carefully and successfully hidden.  Advertisements for adult diapers or remedies for sexual dysfunction, and an eager willingness to parade one's marital failures on television are enabled by a profound cultural change.  Whether you call this change an increase in candor or a decrease in shame - or both - is irrelevant.  The change cannot  seriously be doubted, and it makes us disinclined to keep secrets, or even to take secrecy seriously as a useful value in human affairs.  to the extent we are in a a post-privacy world, we are also in a post-secrecy world.”

“Transparency and network anarchy have disoriented us.”

Chapter 10:  Managing the Mess


Private sector recommendations:
  1. Clean up your act
  2. Control what’s on your system
  3. Control who’s on your system
  4. Protect what’s valuable
  5. Patch rigorously
“Yet studies have shown that many penetrations of commercial systems take place through unpatched vulnerabilities.  In 71 percent of those cases a patch had actually been available but not used for more than a year.  Firms that behave this way are like drivers who leave the keys in their car overnight on a city street with the windows open.  They shouldn’t be surprised when it’s gone in the morning.”
  1. Train everybody
  2. Audit for operational effect
  3. Manage overseas travel behavior


Welcome!

Welcome to my blog!

I started this blog so that I'd have an independent forum on which I can share my thoughts, observations and interests.

Thanks for taking the time to stop by; I plan to post on fairly regular basis, so please come back!