Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide

You're reading from  ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide

Product type Book
Published in Sep 2023
Publisher Packt
ISBN-13 9781803236902
Pages 316 pages
Edition 1st Edition
Languages
Author (1):
Shobhit Mehta Shobhit Mehta
Profile icon Shobhit Mehta

Table of Contents (28) Chapters

Preface 1. Part 1: Governance, Risk, and Compliance and CRISC
2. Chapter 1: Governance, Risk, and Compliance 3. Chapter 2: CRISC Practice Areas and the ISACA Mindset 4. Part 2: Organizational Governance, Three Lines of Defense, and Ethical Risk Management
5. Chapter 3: Organizational Governance, Policies, and Risk Management 6. Chapter 4: The Three Lines of Defense and Cybersecurity 7. Chapter 5: Legal Requirements and the Ethics of Risk Management 8. Part 3: IT Risk Assessment, Threat Management, and Risk Analysis
9. Chapter 6: Risk Management Life Cycle 10. Chapter 7: Threat, Vulnerability, and Risk 11. Chapter 8: Risk Assessment Concepts, Standards, and Frameworks 12. Chapter 9: Business Impact Analysis, and Inherent and Residual Risk 13. Part 4: Risk Response, Reporting, Monitoring, and Ownership
14. Chapter 10: Risk Response and Control Ownership 15. Chapter 11: Third-Party Risk Management 16. Chapter 12: Control Design and Implementation 17. Chapter 13: Log Aggregation, Risk and Control Monitoring, and Reporting 18. Part 5: Information Technology, Security, and Privacy
19. Chapter 14: Enterprise Architecture and Information Technology 20. Chapter 15: Enterprise Resiliency and Data Life Cycle Management 21. Chapter 16: The System Development Life Cycle and Emerging Technologies 22. Chapter 17: Information Security and Privacy Principles 23. Part 6: Practice Quizzes
24. Chapter 18: Practice Quiz – Part 1
25. Chapter 19: Practice Quiz – Part 2
26. Index 27. Other Books You May Enjoy

Third-Party Risk Management

So far, we’ve learned about IT risk management and the different methods to perform a risk assessment and response, as well as monitoring. In this chapter, we will dive deep into third-party risk management (TPRM), how to assess downstream third parties (vendors) and support businesses for upstream third parties (customers), and how to manage emerging risks. We will also look at how to manage issues, findings, and exceptions that may impact the business operations of an organization.

This chapter aims to help you learn about the concepts of TPRM and how to perform an effective third-party risk evaluation. We will also learn about issues, findings, and exceptions and how to manage them effectively.

In this chapter, we will cover the following topics:

  • The need for TPRM
  • Managing third-party risks
  • Upstream and downstream third parties
  • Responding to anomalies

With that, let’s dive into the first section: The need...

The need for TPRM

Before we start learning about TPRM, I think we should talk a bit about why these third parties are required in the first place and what specific purpose they serve for the contracting organization.

Third-party outsourcing is a form of delegating services to another party, such as day-to-day operations, software services, storage, compute, networking, and more, so that the enterprise can focus on its most essential services while delegating the services that can be performed by another organization.

The relationship between the enterprise and the third party is defined in a legally binding contract. The contract includes the set of provisions that the enterprise and hence the outsourcing organization needs to adhere to, such as data storage, compliance with local laws and regulations, jurisdiction in case of disagreements, indemnification clauses, payment terms, service-level agreements (SLAs), and security and privacy requirements that the third party needs...

Managing third-party risks

Whenever an organization determines a service that needs to be outsourced, a risk practitioner should be involved in assisting the business in determining the right partners, as well as performing due diligence on the selected vendor. The typical process to determine the right partners and manage the third-party risk should go like this:

  1. The business process owner comes up with a use case for outsourcing a service to a third party and has all the necessary approvals from relevant stakeholders.
  2. A request for proposal (RFP) or similar is published or key players in the space are reached out to so that they can assess the availability and alignment of the requirements of the organization.
  3. Of all the vendors, a selected few are moved to the next stage so that they can demonstrate how their capabilities are aligned with the requirements of the organization, any niche features that are not available with other vendors, and budget considerations...

Upstream and downstream third parties

Often, when we think of third parties, we only think about the vendors providing services to us. However, there is another set of third parties that are equally if not more important than the vendors – our customers. I am not sure whether this is a term that is used in the industry to describe customers, but for the sake of this chapter, we will consider downstream third parties as vendors providing services to us and upstream third parties as customers to whom we provide services.

While we assess our vendors and perform due diligence, our customers must perform the same due diligence on us. Therefore, it is important to ensure that the organization maintains a robust internal risk management and cybersecurity program.

One of the best ways to streamline all the components of a risk management program to satisfy third-party requirements is to conduct an external certification such as ISO 27001 or HITRUST CSF or perform an independent...

Responding to anomalies

Regardless of stringent security controls, an organization will always have some issues and exceptions. The goal of a risk practitioner is to ensure that sufficient controls are put in place and procedures are developed in the case of an issue or exception that might pose a risk. For instance, an organization may have implemented an overarching policy of disabling USB access for all employees, but it may be required by the sales team to show a demo of an application or the developers to run a code snippet and perform thorough testing. In those cases, the risk manager should strive to balance such one-off cases by defining a mechanism to manage these requests. In the following section, we will review a few ways to manage these issues, findings, and exceptions.

Managing issues, findings, and exceptions

The following are a few formal approaches to managing issues, findings, and exceptions:

  • Configuration management: Configuration management requires...

Summary

At the beginning of this chapter, we learned about the risk posed by third-party entities and how it can be managed. We then learned about the importance of managing downstream as well as upstream third-party relationships. With the recent trends and an uptick in third-party attack vectors, risk managers should keep themselves abreast of the latest trends and ensure that the risk posed by these threat actors can be minimized by implementing a TPRM program. Next, we learned about issues, findings, and exceptions and the role of configuration, release, exception, and change management to manage these risks. Finally, we learned about the importance of CAB in approving these changes. The goal for risk practitioners is to strike a balance of security and usability without compromising the organization’s security goals.

In the next chapter, we will learn about control design and its implementation.

Review questions

  1. Which of the following would bind a third party to provide monetary credits to the organization in case of a service failure?
    1. Master service agreement
    2. Service-level agreement
    3. Non-disclosure agreement
    4. External audit
  2. Which of the following should be signed with the third party to protect the intellectual property and interests of the organization?
    1. Master service agreement
    2. Service-level agreement
    3. Non-disclosure agreement
    4. External audit
  3. Which of the following is not the final output of an external audit?
    1. SOC 2 report
    2. ISO 27001 certification
    3. HITRUST certification
    4. Non-disclosure agreement
  4. The IT team is implementing new software across the organization and is defining the baseline control settings for end users. This is an example of ___.
    1. Release management
    2. Change management
    3. Configuration management
    4. Exception management
  5. The risk practitioner should review and verify the granted exceptions are still required at least ___.
    1. Weekly
    2. Monthly
    3. Quarterly
    4. Annually
  6. The CAB should...

Answers

  1. B. A breach in the SLA allows the organization to demand monetary credit.
  2. C. Non-disclosure agreements protect the intellectual property and interests of the organization.
  3. D. Non-disclosure agreements are agreed upon and signed within the organization and by third parties. All the other options are the results of an external audit.
  4. C. Baseline controls are set as part of configuration management.
  5. D. The granted exceptions should be verified at least annually.
  6. D. The CAB should consist of all relevant stakeholders.
lock icon The rest of the chapter is locked
You have been reading a chapter from
ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide
Published in: Sep 2023 Publisher: Packt ISBN-13: 9781803236902
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}