top of page

Third Party Risk or How to get your vendor to do NIST


I’ve been coming across this with many 3rd party outsourced relationships. This is why there is so much risk in 3rd party relationships. The question is, how do make sure that the controls that a 3rd party has in place or put in place for you, stay in place and are enforced at all times, so that the disposition of the confidentiality, integrity, and availability of our data is not just trusted but verified at all times. As Reagan and Gorbachev said “trust but verify” (“Doveray no proveray”).


The easiest way to do this is to have them send us the logs of our environment at the 3rd party so we can monitor that disposition. Raw data about events in the O/S, the apps, the vulnerabilities, etc allow you to work with the 3rd party as a real extension of your datacenter in real time rather than take temperatures every year.


3rd parties, because they specialize in something that you cannot afford to do, are integral to the value chain. There are 100s of them. Along with business processes, IT bandwidth and application functionality, data also flows through that chain/those vendors/3rd parties. While you can outsource systems and services, you cannot outsource your risk associated with that data and how it’s managed. Regulators have been consistently (see the regulations below) and clearly giving that message for years, in writing and in practice. So, the way I read all the below, we need to keep much closer detective controls on the disposition of our data, and preventative if you can get them. Again, the easiest way to do this is via monitoring, i.e. log monitoring via the SIEM. This needs to be written into your contracts. The vendors that can provide this will survive.


One of the first and most important regulations that I take as a lodestone is the Federal Deposit Insurance Corporation (FDIC) issued this formal guidance in 2008: “An institution's board of directors and senior leadership are ultimately responsible for managing activities conducted through third-party relationships, and identifying and controlling the risks arising from such relationships, to the same extent as if the activity were handled within the institution” (www.fdic.gov). That’s pretty clear direction. Yet most of us still outsource the data, and the oversight of it.

There are regulations for Financial Institutions in this area from regulators such as the FDIC, the Office of the Comptroller of the Currency, the Securities and Exchange Commission, the National Association of Insurance Commissioners, the New York Department of Financial Services, and even the European Union. Add to that forty seven U.S. states have unique data privacy regulations on their books. I’ve put the most important below.


The regulators know that good risk management requires full transparency with ourselves and our 3rd party vendors. Given the recent large scale breaches, the regulators are placing an even higher priority on 3rd party risk management. Their appetite is trending toward stronger data management regulations; the European Union General Data Protection Regulation is a sea change for us and every corporation and entity worldwide. They are forcing the question that our 3rd party vendors are not “outsourced”, but really another integrated part of our environment. Transparency between us and them enables accountability and enforcement through constructive collaboration.

Achieving deep transparency is challenging enough internally, let alone with the 3rd party vendors. These companies are simply not part of our own organization and so do not see themselves as subject to our direct oversight. This includes enforcing our NIST controls. So, the question is how do we get them to enforce our NIST controls and make sure they do so on a continual basis?


The common practice of using risk questionnaires is helpful in periodically assessing the investments our 3rd parties may have made in managing their cybersecurity risk. Unfortunately questionnaires don’t tell you how well they implement and operate their programs, esp on a continual basis. Yet, continual verification is exactly where best practice in the wake of recent breaches and the regulators are driving us. So, again, we need to use the logging and other monitoring methods above.


The bottom line: we need to up our 3rd party risk management game with continuous monitoring enforced via our contracts. It will be a tough proposition to implement, having to work with contracts and legal on both sides of the relationship. We should start and use a risk based approach so that we take the riskiest applications and data first.




Third Party Risk Management Regulations


Financial Service Sector

Federal Financial Institutions Examination Council –

“The board of directors and senior management are responsible for understanding the risks associated with outsourcing arrangements for technology services and ensuring that effective risk management practices are in place.”

“External dependency management includes the connectivity to third-party service providers, business partners, customers, or others and the financial institutions’ expectations and practices to oversee these relationships.

“Many financial institutions have processes to manage third-party relationships and document their connections. Before executing a contract, it is important for management to consider the risks of each connection and evaluate the third party’s cybersecurity controls. In addition, financial institutions should understand the third parties’ responsibility for managing cybersecurity risk and incident response plans.”


“Financial institutions should establish and maintain effective vendor and third-party management programs because of the increasing reliance on nonbank providers. Financial institutions must understand the complex nature of arrangements with outside parties and ensure adequate due diligence for the engagement of the relationships and ongoing monitoring.”


Office of the Comptroller of the Currency –

"A bank’s use of third parties to achieve its strategic goals does not diminish the responsibility of the board of directors and management to ensure that the third-party activity is conducted in a safe and sound manner and in compliance with applicable laws. Many third-party relationships should be subject to the same risk management, security, privacy, and other consumer protection policies that would be expected if a national bank were conducting the activities directly."


OCC Bulletin 2013-29 (Issued 2013)

"The Office of the Comptroller of the Currency (OCC) expects a bank to practice effective risk management regardless of whether the bank performs the activity internally or through a third party. A bank’s use of third parties does not diminish the responsibility of its board of directors and senior management to ensure that the activity is performed in a safe and sound manner and in compliance with applicable laws."


OCC Bulletin 2017-21 (Issued 2017)

"Bank management should conduct in-depth due diligence and ongoing monitoring of each of the bank’s third-party service providers that support critical activities. The OCC realizes that although banks may want in-depth information, they may not receive all the information they seek on each critical third-party service provider, particularly from new companies. When a bank does not receive all the information it seeks about third-party service providers that support the bank’s critical activities, the OCC expects the bank’s board of directors and management to:

• develop appropriate alternative ways to analyze these critical third-party service providers

• establish risk-mitigating controls."


Federal Deposit Insurance Corporation –

“Financial institutions often rely upon third parties to perform a wide variety of services and other activities. An institution's board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships, and identifying and controlling the risks arising from such relationships, to the same extent as if the activity were handled within the institution.”


New York Department of Financial Services –

23 NYCRR 500 (Issued 2018)

“Third Party Service Provider Policy. Each Covered Entity shall implement written policies and procedures designed to ensure the security of Information Systems and Nonpublic Information that are accessible to, or held by, Third Party Service Providers. Such policies and procedures shall be based on the Risk Assessment of the Covered Entity and shall address to the extent applicable:

1. the identification and risk assessment of Third Party Service Providers; 2. minimum cybersecurity practices required to be met by such Third Party Service Providers in order for them to do business with the Covered Entity 3. due diligence processes used to evaluate the adequacy of cybersecurity practices of such Third Party Service Providers; and 4. periodic assessment of such Third Party Service Providers based on the risk they present and the continued adequacy of their cybersecurity practices.”


Insurance Sector

National Association of Insurance Commissioners –

"(1) A Licensee shall exercise due diligence in selecting its Third-Party Service Provider; and

(2) A Licensee shall require a Third-Party Service Provider to implement appropriate administrative, technical, and physical measures to protect and secure the Information Systems and Nonpublic Information that are accessible to, or held by, the Third-Party Service Provider. "


Healthcare Sector

United States Department of Health and Human Services –

HIPAA Security Rule - 45 C.F.R. 164.308 (Issued 2002)

(b)(1) Standard: Business associate contracts and other arrangements. “A covered entity, in accordance with §164.306, may permit a business associate to create, receive, maintain, or transmit electronic protected health information on the covered entity’s behalf only if the covered entity obtains satisfactory assurances, in accordance with §164.314(a) that the business associate will appropriately safeguard the information.”

NOTE: Healthcare entities are managing fourth party risk by requiring business associates to comply with the HIPAA Privacy and Security rules.


HIPAA Omnibus rule (Issued 2013)

Make business associates of covered entities directly liable for compliance with certain of the HIPAA Privacy and Security Rules’ requirements.

These provisions include extending the applicability of certain of the Privacy and Security Rules’ requirements to the business associates of covered entities; requiring that Health Information Exchange Organizations and similar organizations, as well as personal health record vendors that provide services to covered entities, shall be treated as business associates; requiring HIPAA covered entities and business associates to provide for notification of breaches of ‘‘unsecured protected health information’’;

“…it is the business associate that must obtain the required satisfactory assurances from the subcontractor to protect the security of electronic protected health information…”


The HITECH Act extended the HIPAA Privacy and Security rules and related liability beyond covered entities to also include business associates – the vendors to covered entities.

“These provisions include extending the applicability of certain of the Privacy and Security Rules’ requirements to the business associates of covered entities…”


Cross- Sector

The European Union –

Section 81 “To ensure compliance with the requirements of this Regulation in respect of the processing to be carried out by the processor on behalf of the controller, when entrusting a processor with processing activities, the controller should use only processors providing sufficient guarantees, in particular in terms of expert knowledge, reliability and resources, to implement technical and organisational measures which will meet the requirements of this Regulation, including for the security of processing.”

Section 83 “In order to maintain security and to prevent processing in infringement of this Regulation, the controller or processor should evaluate the risks inherent in the processing and implement measures to mitigate those risks, such as encryption. Those measures should ensure an appropriate level of security, including confidentiality, taking into account the state of the art and the costs of implementation in relation to the risks and the nature of the personal data to be protected.”





Recent Posts

See All

Comments


+1 917 6035530 / +44 7553 553877‬

  • linkedin
  • twitter

©2025 by Joel M. Van Dyk. Proudly created with by Caliativity Productions on wix.com

bottom of page