The Risks of Outsourcing Information Security

Oct. 27, 2008

Objective: To point out the current status of four basic controls for effective information risk management: background vetting, access management, risk assessment and proactive due diligence.

Results Sought: Using data from an aggressive risk assessment program, the CSO wants to inform management and eliminate plausible denial. He or she can then use that awareness to engage action on current risk exposure while urging a more focused risk management strategy going forward. The CSO also hopes to encourage management to adopt a more risk-focused due diligence process — one that proactively seeks out vulnerabilities and factors them into the procurement and post-contract oversight process.

Risk Management Strategy : Outsourcing has become a fundamental business strategy for most major corporations. By outsourcing, businesses seek to gain an improved focus on core competencies and more profitable activities — reducing the cost of operations, obtaining specialized expertise and improving access to global markets. What they often overlook, however, are the risks that accrue due to the loss of effective business controls over sensitive activities — particularly those associated with the information infrastructure and vital information assets.

On one hand, the chart above shows that the security strategy has been effective in driving requirements for background vetting (often resisted by suppliers), setting parameters on access to information assets and performing risk reviews. On the other, the chart shows that more than a third of those with access have not been vetted, nor have they signed access agreements. Of greater concern are the findings that 80 percent of information assets allow third-party access and 37 percent of the known information security risks are related to outsourced partners.

Using this metric, the CSO can point out the known risks related to third-party relationships that are assignable to prior incidents and current risk assessments and can highlight particular findings of most immediate concern. For example, which of those unvetted non-signatories have access to the company's most sensitive data or critical elements of the infrastructure? Similarly, which of the company's most essential platforms, applications or data sets have failed to limit access, and what are the potential consequences of these vulnerabilities?   Engaging business unit heads who “own” these relationships and determining answers to these questions will enable improved oversight and required mitigation tactics.

Where is the data?   As shown on the green bar, fully 94 percent of the company's outsourced relationships have been risk assessed, providing a rich and timely database for determining the scope and nature of risk in this aspect of the corporate outsourcing program. The CSO can also gain useful information if the security organization maintains an effective incident reporting and cyber investigation program that yields data related to risks assignable to third-party relationships. Engaging accountable business units in the results of these assessments will also yield data on the potential risks associated with these findings.

George Campbell is emeritus faculty of the Security Executive Council and former CSO of Fidelity Investments. His book, Measures and Metrics in Corporate Security , may be purchased through the Security Executive Council Web site, www.csoexecutivecouncil.com/?sourceCode=std . The information in this article is copyrighted by the Security Executive Council and reprinted with permission. All rights reserved.