Achieving Real IT Assurance Across System Boundaries
In modern integrated computer systems, assurance activities such as assessments, tests, and audits are increasingly difficult to perform in multi-party environments. But there are a few key tactics that can help.
June 01, 2020 at 07:00 AM
6 minute read
Credit: metamorworks/Shutterstock.com
Providing an adequate level of IT assurance for legal industry leaders has become a high-profile challenge, as firms of all sizes find themselves on the front lines of the global ransomware war.
Just last month, cyber hackers made a $42 million ransomware demand to a high-profile celebrity law firm in New York, and unfortunately these types of attacks are becoming more common. To compound this problem, the industry is faced with increasingly distributed IT systems, as cloud infrastructure, hosted applications, and outsourced services blur the boundaries between your firm and the rest of the world. So let's define the issues and discuss actionable steps all legal industry leaders can oversee to provide effective IT assurance activities that will help keep your firm from becoming the next victim.
As we enter the new decade, our information systems are more interconnected than they have ever been. And this trend will not only continue, but accelerate. A typical organization computer system is interconnected with an entire ecosystem consisting of numerous integrated entities, including: service vendors, cloud vendors, peers, clients, and your own internal shadow IT. And it does not stop there, as vendors and their applications are also integrated with other clients, service providers, etc.; the web of interconnectedness is almost endless.
So how does a law firm gain assurance about cybersecurity when the interconnections are myriad and the boundaries are blurred? Before we start exploring answers to this question, let's review a typical real-world example of how breaches occur across system boundaries.
For our history lesson, let's examine the infamous 2013 Target breach. This well-studied breach clearly indicates it all started with a third-party heating/air conditioning maintenance contractor. This small vendor did not have the sophisticated security controls of a major retailer like Target. But, as a Target vendor, they did have access to Target's vendor portal. After hackers breached the heating/air conditioning vendor's network (via a phishing email), they then had authenticated access to Target's vendor portal systems. Throw in a missing patch on the portal web server, and the thieves proceeded to gain administrative control of the network and steal information on approximately 40 million credit cards. Similar scenarios have played out over and over again in the ensuing seven years, and, as already noted, the number of integrated entities is only growing.
In modern integrated computer systems, assurance activities such as assessments, tests, and audits are increasingly difficult to perform in multi-party environments. But there are a few key tactics that can help.
At the strategic level, the first thing all organizations should do is rigorously inventory data assets and data stores. Know where your information is stored plus when, where, and how it is transmitted. Define who has data ownership responsibility, and who is responsible for securing the data. Only by knowing exactly what data your organization handles, and how you transmit and store it, can you begin to provide assurance about its confidentiality, integrity and availability (CIA).
Next, make sure you have strong contractual arrangements with your key vendors, service providers and partners. Whether your relationship is with a key cloud application, support, or internet service vendor, strong interconnect security agreements provide the foundation for assurance across boundaries. From data classifications to rules of behavior and incident reporting, a strong agreement defines responsibilities and reduces ambiguity. For clear guidance on what is essential to include in interconnect agreements, see the National Institute of Standards and Technology Special Publication 800-47 Security Guide for Interconnecting Information Technology Systems.
Ultimately, at the tactical level, we must, in the words of Ronald Reagan, "trust but verify." Only penetration testing of controls can validate weaknesses in our IT defenses. And testing must be comprehensive, across not only technical controls, but also human and physical safeguards. As outlined in the Target breach example, a simple human attack (in this case, a phishing email) at a third party vendor can lead to a massive breach. Testing technical controls alone will not show where hackers can successfully attack your IT systems. Comprehensive testing will reveal cascading sequences of exploits that may lead to control of your system in a way vulnerability scans or program audits can never achieve.
Including key third parties in your testing regimen is not always easy, but there are some compelling arguments you can make. Remind key integrated entities we are all in this together, and we may very well share vulnerabilities. Attempt to convince them that only by testing the entire interconnected ecosystem can we find weaknesses. Reassure them the object is NOT to make them look bad. If all else fails, and key third parties refuse to provide permission, demand to see evidence of their own due care and due diligence, e.g. a cover letter from their penetration testing vendor. The good news is big players, like Microsoft and Amazon, provide almost blanket permission for third-party testing of their cloud infrastructures and applications. Getting all cloud/outsourced/interconnected vendors to participate remains a challenge, though.
When discussing IT assurance across boundaries, we are often asked about cyber liability insurance and related products. In our current multi-party liability landscape, the devil is in the policy details. Whether selling or buying, all parties should make themselves well aware of policy terms.
An easy example is defining exactly what systems, applications, and data sets are covered by the policy, e.g. are industrial controls systems covered? How about mobile devices or cloud applications and systems? The web of interconnected systems makes it difficult for underwriters to cover everything, and paying to cover all interconnected systems can be difficult for policy holders to afford.
It is also important to know exceptions in coverage based on inadequate due diligence, e.g. if the policy holder is not adequately performing configuration management (missing patches) or adequate vendor management (including vendors in tests or collecting evidence of their due diligence activities)?
All parties must also agree on what exactly constitutes a covered breach, e.g. is a physical theft of information assets a covered act? How about coverage of a state-sponsored attack? Is an inadvertent disclosure of PII covered? The list goes on.
In summary, providing real assurance across the boundaries of myriad interconnected systems is a daunting challenge. And the terrifying threat landscape we face puts business and personal interests, if not our very democratic institutions, at stake. The fact the security of any single entity affects the security of the entire integrated ecosystem demands we act in concert to defend our interests. The least we can do is attempt to get our key third parties to participate in comprehensive testing. Even if they refuse, the result of our conversation with them will be increased awareness, better communication and, hopefully, a call to action.
David Trepp is the partner of Information Security Assessment Services Group at accounting and advisory firm BPM LLP. Contact David at [email protected].
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
- 1Dissenter Blasts 4th Circuit Majority Decision Upholding Meta's Section 230 Defense
- 2NBA Players Association Finds Its New GC in Warriors Front Office
- 3Prenuptial Agreement Spousal Support Waivers: Proceed With Caution
- 4DC Circuit Keeps Docs in Judge Newman's Misconduct Proceedings Sealed
- 5Litigators of the Week: US Soccer and MLS Fend Off Claims They Conspired to Scuttle Rival League’s Prospect
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250