Streamlining Vendor Risk Management with the HECVAT

Slides:



Advertisements
Similar presentations
BalaBit Shell Control Box
Advertisements

Copyright © 2011 Cloud Security Alliance Cloud Controls Matrix Work Group Session Sean Cordero President of Cloudwatchmen,
T /5115 Software Development Project I/II Project Planning Jari Vanhanen Ohjelmistoliiketoiminnan ja –tuotannon laboratorio Software Business and.
1 Purchasing and Procurement Processes Module Four Revision Date: 2/06/2015.
Windows XP Migration Jumpstart Offering Offering Datasheet The Challenges With less than one year until the end of support for Windows XP, customer are.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 1.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM Laura Posey, Chair CAIQ.
How to Gain Comfort in Losing Control to the Cloud Randolph Barr CSO - Qualys, Inc SourceBoston, 23. April 2010.
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
User Management: Understanding Roles and Permissions for Schoolnet Schoolnet II Training – Summer 2014.
Shared Services Initiative Summary of Findings and Next Steps.
1 March 19, Test Plans William Cohen NCSU CSC 591W March 19, 2008.
Society for Maintenance and Reliability Professionals (SMRP)
Create a system that reflects higher education best practices
Law Firm Data Security: What In-house Counsel Need to Know
(3.6) General requirements on resources for the establishment of IMS
Michael Wright • Chief Security Officer • Tech Lock
Use Cloud Computing to Achieve Small Enterprise Savings
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
Project Management Business Management.
Insider Connectivity Review & Savings Analysis
INSPIRE and the role of Spatial Data Interest Communities (SDIC)
BruinTech Vendor Meet & Greet December 3, 2015
Campus Cloud Security Shared Assessments
Internal and external control in an automated environment
New A.M. Best Cyber Questionnaire
Overview of Consultants in Sponsored Projects (OSR)
Strengthening CIO and CISO Collaboration on Security and Privacy
Overview of IT Auditing
Data Minimization Framework
Super Skills for 21st Century Learners
Tarrant County Criminal Courts Phase 1 Implementation
Innovative Solutions from Internet2
Microsoft 365 Get help with regulatory compliance
Data & Technology Updates April, 2016
IT Project Management Version IT Industry Apprenticeship System
SCC P2P – Collaboration Made Easy Contract Management training
Trilateral Research EUROPEAN COMMISSION
Workforce Transition for Your Agency’s Administrative Services
Cloud Service Procurement: Engaging the CISO for a Risk Assessment
Prepared by Rand E Winters, Jr. ASR Senior Auditor October 2014
Microsoft SAM for Hosting (SPLA)
Understanding and Utilizing the ISP Analysis Process
CMS HIPAA Transaction Implementation Status Checklist
Operational and Postimplementation
Project Name Steering Committee Meeting Project Manager: Project Manager Name Program Manager: Program Manager Name Project Sponsor: Project Sponsor Name.
Matthew Christian Dave Maddox Tim Toennies
Business and Management Research
IBM Kenexa BrassRing on Cloud Responsive Apply: Gateway Questionnaire Configuration April 2017.
PRELIMINARY DESIGN Stage Gate Reviews
GENERAL SERVICES DEPARTMENT Facilities Management Division PROOF –NM (Process Reengineering & Optimization of O&M Functions for New Mexico) Phase II.
Leveraging the HECVAT for Cloud Vendor Assessments
Shared Assessment Committees Update
Sarbanes-Oxley Act (404) An IT Viewpoint
Title and Total Compensation Project
Smart Grids activities in ETSI
Change Management and COBIT®. ISACA London Chapter Presentation
Business and Management Research
ICT Utilization and Maintenance
New Assessment & Test Methods
Education and Training Statistics Working Group, May 2011
An IT Viewpoint Darin Kreimeyer, Senior Manager Newel Linford, Manager
(Project) SIGN OFF PROCESS MONTH DAY, YEAR
IT Management Services Infrastructure Services
EFSA’s dedicated support for SMEs
WG 03 IoT Identifier Task Force Status 11/2017
Peer Cybersecurity Assessments: For and by Higher Education
WORK STREAM TEAM DELIVERABLES
General Services Department State Purchasing Division
Presentation transcript:

Streamlining Vendor Risk Management with the HECVAT PRESENTED BY: Joanna Grama EDUCAUSE; Kim Milford REN-ISAC

Agenda Project inspiration and the “job to be done” Phase I work and completion Phase II deliverables and current status Questions

Project Inspiration Campuses are rapidly adopting cloud services and deploying software systems Assessing the risk for cloud services and software systems as quickly as possible Developing vendor risk management programs Developing enterprise risk management programs Too much to do to effectively do it all!

This is a big project--so it was divided into two phases. The Job to Be Done How to easily and quickly share work done in many institutions Free up time & resources for critical information security functions Create a forum/space to share and find existing shared assessments Build on higher education information security community sharing Ease vendor burden in assessment response This is a big project--so it was divided into two phases.

Phase I Deliverable www.educause.edu/hecvat Create a cloud services assessment questionnaire/template that can be used to surface a short executive summary for review & sharing. Collaboration between Internet2, EDUCAUSE, REN-ISAC and its members. The Higher Education Cloud Vendor Assessment Tool (“HECVAT” if you are cool) www.educause.edu/hecvat

ANSWER We provided a Manual [in the form of an “Instructions” tab]! Read The * Manual! PROBLEM No Directions + 100’s of Questions = Insufficient Vendor Responses ANSWER We provided a Manual [in the form of an “Instructions” tab]! Document Layout General Info Sharing Selections Documentation Company Overview Safeguards HECVAT Kim Image: https://pixabay.com/p-153214/?no_redirect, accessed April 20, 2017.

Initially, there are four use case specific sections... # of ?s Summary Third Parties* 4 When a vendor (third party) uses a third party to support their product it is important to document vendor security assessments, any legal agreements, and general use case information. Section requirement based on Qualifier. Consulting* 11 Controlled through a Qualifier. Vendor assessments for consulting services only require only a subset of questions to be answered; the remaining become optional. PCI DSS* 12 Controlled through a Qualifier. The PCI DSS section is required when PCI DSS regulated data is shared. HIPAA* 32 Controlled through a Qualifier. The HIPAA section is required when PCI DSS regulated data is shared. The largest section.

Although pioneering and useful, the HECVAT’s scope is specific and it has some limitations The tool is long and we recognize this could be cumbersome for low risk evaluations Requires significant resources to properly digest and analyze vendor responses May not be appropriate for vendor engagements using lower-level data classifications Kim Analysis - will take time to develop expertise to suss out the +s and -s. Once your internal experts develop a baseline, it will go faster.

Phase II Phase II started in March 2017 Deliverables include: Feedback Gathering HECVAT Lite Crosswalk to standards Sharing infrastructure/proof of concept Joanna HECVAT Lite Is the lite version a subset of the DATA Questions (rows 141-172) in the current HECVAT? Is a lite version needed for “less complex” situations or to flag vendors/products where more review might be needed? Feedback Gathering--What is the institutional experience in using the HECVAT Crosswalk Work--Mapping to infosec standards as needed. Expectations paper--Independent of the HECVAT or other tools, what types of information/documentation do we expect from cloud vendors re security and privacy? Sharing infrastructure paper/proof of concept---This is the big kahuna deliverable

Deliverable: HECVAT Lite The HECVAT is a mere 284 questions This includes qualifying questions for HIPAA and PCI opt-in The HECVAT Lite project is to create a very lightweight version of the HECVAT for use in special situations Short on time? Short on personnel to review? Short on budget? Short on risk?

Deliverable: Crosswalk to Standards Understanding how HECVAT questions compare to industry standards is useful Did we mention, 284 questions? That is a lot to crosswalk. Currently we are reviewing, ISO 27002:2013; NIST SP 800-53 Controls; NIST SP 800-171 Controls; NIST Cybersecurity Framework; CIS 20 Critical Security Controls (ver 6.1); HIPAA Security Regs; PCI DSS Regs Joanna Mapping to sub controls is probably an unreasonable expectation Do we want to CSA CCM (which has mappings to other frameworks)? YES, we should This is a big iterative process project

REN-ISAC Cloud Broker Index The Cloud Broker Index provides an up-to-date index of participating vendors with links to their completed assessments.  If a vendor is already listed in the CBI, security assessors at colleges and universities can utilize the posted assessment, saving time for both security assessors and service providers.  If you’d like to see a vendor added to the Index, or if you have feedback, please contact us at HECVAT@REN-ISAC.NET and provide us with the vendor, the product, and contact information.

Internet2 Cloud Services Enable cohesive cloud service administration, procurement, and orchestration for campuses Enable enhanced community collaboration around cloud service evaluation and validation Including HECVAT in NET+ Resource for sharing more security information

Questions for You Have you used the HECVAT? Take our survey and share your feedback please! https://www.surveymonkey.com/r/PQSLMBK

Questions for Us? www.educause.edu/hecvat

Thank You! Please be sure to complete the session evaluation so that we can improve our presentation next time!