Understanding Third-Party Management

Jouke Albeda
作者: Jouke Albeda, CISA, CISSP, RE
发表日期: 2021年10月5日

Outsourcing IT to a platform as a service (PaaS) is incredibly popular with organizations that want to focus on other essential business processes. Even software development organizations often outsource IT, and organizations responsible for the uptime of IT applications no longer own hardware and IP connections. I call what is happening to IT stapling. 例如, infrastructure is outsourced with infrastructure as a code, the source code is hosted and tracked within a repository service and testing is automatically performed by a tool hosted somewhere else. 最重要的是, multiple applications are running that support several business processes, and the actual software applications used are coded by several suppliers. Organizations often have agreements with most of the software suppliers they work with, meaning they are convinced the suppliers have implemented appropriate controls to guarantee the organization can always work with the software. 然而, this means trusting not only the software supplier but the whole chain of suppliers. 那么,你怎么做呢?

Third-party management is something your organization needs to have in place regarding your suppliers and their suppliers. You may wonder why it is so important given that your risk analysis likely notes that you transferred risk to the supplier. Consider what happens when the supplier does not meet delivery expectations and disturbs business processes. 供应商可能负有责任, but the disruption still effects your clients, your brand reputation and your productivity. 2019年, main cause of business disruption was unplanned IT or telecommunications outages.

When it comes to third-party management, International Organization for Standardization (ISO) certifications or assurance reports such as SOC2 Type II reports are generally requested. 然而, for each and every supplier (and sub-service organizations of that supplier when significant) it should be determined what risk is related to the services that are outsourced. Is the risk related to the continuity of essential business process or is it related to confidential information? Confidentiality, integrity and availability (CIA) are the basis for this analysis. Topic areas such as laws and regulations (e.g., does the supplier process personal identifiable information [PII]?) can be included in this analysis. Every important area of your organization should be assigned a risk rating (i.e., high, moderate, low), which determines what kind of assurance documentation you need. 当然, you can demand the highest level of assurance from every supplier, 但这可能并不现实. If you demand continuous monitoring and SOC2 Type II reports, your supplier costs will be immense. For low risk outsourced services, a self-assessment may be enough to cover the identified risk.

When implementing an appropriate third-party management system, it is important to be aware that some business processes rely partly on third parties and that there is risk involved with adopting them. When you are aware of the risk of third parties, you can then divide the risk into topic areas, quantify the risk and start defining the measures for managing the risk. This framework helps you make sure you can rely on your suppliers (and their suppliers).

编者按: For further insights on this topic, read Jouke Albeda’s recent Journal article, “Third-Party Assurance: Why and How?,” ISACA杂志,第二卷,2021年.

别忘了,澳门赌场官方软件可以 免费获得CPE 来自ISACA期刊的测验!

ISACA杂志