Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all articles
Browse latest Browse all 12749

Security Think Tank: Risk tolerance key to security outsourcing policy

0
0

Many small and medium-sized enterprises (SMEs) attempt to close the breaches in their defences in a cost-effective way by bringing in managed service providers (MSPs). Yet the irony is that outsourcing critical security controls in order to deal with the proliferation of threats can further increase the potential array of attack vectors that hackers can exploit.

So what steps can SMEs take to maintain confidence that MSPs are managing their cyber security effectively and appropriately? And, crucially, what security controls should be outsourced and which controls should be kept in-house?

Organisations first need to assess their “risk tolerance” level. If their risk tolerance is low, almost anything can be outsourced, from security scanning to compliance reports.

However, an SME supplying the Ministry of Defence (MoD) might have a far lower risk tolerance and should only use a government-approved MSP. If a company has suppliers, customers or partners in the national security realm, it may also be advisable to avoid working with cyber security firms based in hostile states.

Critically it is important for companies to do an audit of all their internal data or systems to identify the “risk profile” of all their systems and data, and the particular sensitivities of each type of data. This will help decide what can be outsourced and to whom.

For example, any vital financial or intellectual property data should never be handed to a company that has a poor security record or a contract without a strong service level agreement (SLA).

Security controls for any systems, servers, networks or data covered by laws such as the public sector information directive should only be outsourced to companies that specify they are compliant in their contracts.

All financial transactions data should be handled in-house, where possible. Then there are obviously considerations such as whether your security MSP houses its data in Europe, where it will be subject to the EU General Data Protection Regulation (GDPR).

Check the small print

Just as some apps collect vast amounts of personal data without our consent to personalise ads and services, your MSP might be collecting vast amounts of data without your knowledge or consent in order to do its job.

I worked with a company that outsourced its database security and administration to an MSP. They were completely unaware of the latent security vulnerabilities hidden in the contract until they discovered that the MSP was making digital copies of all six of their databases.

This was ostensibly so that it could mirror the business’s configuration on its own systems to “trial” new updates before implementing them on the real databases. However, it also meant all the information in those databases was now in the hands of a third party.

The key is to always check the small print in the contract to ensure the MSP is prohibited from accessing any sensitive data or systems in the performance of its duties.


Viewing all articles
Browse latest Browse all 12749

Latest Images

Trending Articles





Latest Images