SlideShare a Scribd company logo
SESSION ID:
#RSAC
Dave Shackleford
Building an Effective Supply
Chain Security Program
GRC-W02
Sr. Faculty and Analyst
SANS
@daveshackleford
#RSAC
Supply Chain Security: What It Means
Supply chain security is a program that focuses on the potential
risks associated with an organization’s suppliers of goods and
services
Attackers are focusing on this!
There are many ways that a supply chain breach could occur
Software compromise, credential theft, and more are becoming
common scenarios
#RSAC
Supply Chain Breach Example: Target
Target experienced a significant breach of roughly 110 million
customers’ data, with at least 40 million payment cards stolen.
During the course of the investigation, it was found that Target
was initially breached through a connection established by one
of their vendors, HVAC vendor Fazio Mechanical Services
#RSAC
Supply Chain Breach Example: Home Depot
Home Depot, another large retailer, also claims that its credit
card breach in 2014 was initially due to stolen credentials from a
third-party vendor.
In many of the most public cases we have seen, the attackers
have targeted personal data, health care information and
financial data, such as debit and credit card details.
#RSAC
Supply Chain Breach Example: OPM
In 2015, the U.S. Office of Personnel Management (OPM)
revealed a significant breach of 22 million records including
sensitive data tied to numerous federal employees, contractors
and military personnel.
This breach, like many others, seems to have originated with
stolen credentials from a background check provider that
worked with OPM, KeyPoint Government Solutions
#RSAC
Getting a Handle on Vendor Management
#RSAC
Current State
Not Defined
• No Process Defined
• Ad Hoc and Inconsistent Approach
Defined &
Implemented
• Consistent but Unstructured Approach
• Documented and Detailed but not Measured or Enforced
Continuous
Improvement
• Monitoring, Measuring, and Process Improvements
• Best Practices for Risk Management and Automation
#RSAC
Vendor Management:
Define Important Vendors
• Define Important Vendors
• “Important” vendors can mean many things
• These are vendors that:
• Are critical to business operations
• Maintain unique or legacy components of importance
• Provide critical services
#RSAC
Vendor Management:
Specify Primary Contacts
• Specify primary contacts
• Coordinate due diligence on vendors and report to senior leadership
using a risk-based approach
• Maintain knowledge of, and compliance with, policies and reporting
requirements.
• File documentation and paperwork with the legal and contracting
teams to ensure there is a central repository and audit trail.
• Coordinate broad communication with those who can add value in
vendor oversight
#RSAC
Vendor Management:
Establish Guidelines and Controls
• Policies should include:
• Requiring the right to audit and test the security controls of vendors and
service providers annually, upon significant changes to the relationship
and in response to audit requests or events
• Requiring vendors to adhere to security monitoring requirements
• Requiring periodic reports from the vendors and service providers
demonstrating service level attainment and performance management
• Requiring vendors and service providers to provide timely notification
pursuant to any security breaches or incidents that may cause impact to
the organization
#RSAC
Vendor Management:
Integrate with Organization’s Practices
• With the pieces in place, a vendor management program
can now start to integrate with the organization’s
assessment and audit practices
• Depending on the industry, organization, and culture, these
practices will vary widely
#RSAC
Supply Chain Security Best Practices
#RSAC
People, Process and Technology
#RSAC
Best Practices: People
• These should be in place at supply chain companies
• HR Teams: Background checks should be performed on a
regular basis for both new and existing employees and
contractors
• Every 6-12 months is ideal
• Monitor all staff that work with your organization’s data
and systems for changes to job status and requirements
• Access to critical systems should be monitored, and all third-party
access should be revoked after a defined period of inactivity
#RSAC
Best Practices: Employment Agreements
• HR and security teams should verify that security
requirements are clearly spelled out in contracts for supply
chain personnel
• Acceptable use provisions should be in place for supply
chain organization employees through their employment
agreements
#RSAC
Best Practices: Process
• Create a supply chain assessment questionnaire and checklists:
• Application security
• Audit and compliance
• Business continuity and disaster recovery capabilities
• Change and configuration management
• Data security and data life cycle management
• Physical (data center) security
• Encryption and key management
• Governance and risk management
• Identity and access management (IAM)
• Infrastructure and IT operations security
• Threat and vulnerability management
#RSAC
Best Practices: Process
• Supply chain review should follow these guidelines:
• Decide on a list of controls with which supply chain organizations
need to demonstrate compliance
• Determine the frequency of security reviews for internal and
regulatory compliance needs
• Define a remediation and arbitration process for handling supply
chain organizations that are not currently meeting security
requirements
#RSAC
Process Best Practices: Code Review
• Code analysis of software should ideally be done for supply
chain partners
• Having the code reviewed should ideally be the
responsibility of the vendors, and they should attest to
software security via a report issued prior to installation or
updates
• Contracts should require this!
• Pen testing of software should also be allowed in contracts
#RSAC
Process Best Practices: Vulnerability Mgmt
• Supply chain vendors should have to provide patches to
their products in a timely fashion
• Heartbleed, Shellshock, and others have affected us significantly
• SLAs should be in place for patch creation
• Supply chain partners should be required to notify you of
data breaches that may materially impact you
• Incidents should be communicated, too…could you be the next
target?
#RSAC
Best Practices: Technology
• The first, and perhaps simplest, change is to begin using
technology services that offer supplier risk ratings or
rankings compared to other industry organizations.
• Monitoring the overall risk ratings of supply chain participants from
other organizations working with them provides information on
industry perceptions of security posture
#RSAC
Technology Best Practices: Privileges
• Vendors and partners with privileges should be controlled:
• Enforce separation of duties and least privilege for accounts
• Implement strict password and account-management policies and
practices
• Log, monitor, and audit all vendor/partner online actions
• Consider a “sandboxed” approach for remote access
• Most importantly, all organizations need a policy and
approach to managing and monitoring privileged users
#RSAC
Technology Best Practices: Network Isolation
• Network isolation and segmentation changes can help with
improving supply chain security
• Remote attacks through supply chain access should be limited
• Careful zoning and network isolation with strategic access controls can
help prevent this
• Multiple authentication points (while annoying) can be useful
• Logs and events from remote access systems (VPNs, etc.) should
be carefully monitored
• Jump boxes and “thin client” approaches are also valuable
#RSAC
Technology Best Practices: Analytics+Threat
Intelligence
• Many organizations use or plan to use security analytics tools
and threat intelligence to help identify and combat advanced
attacks
• Analytics platforms provide:
• Deep data sets
• Pattern recognition
• Machine learning
• Threat intelligence can help to correlate information gleaned
from internal sources with indicators of compromise spotted by
other organizations
#RSAC
Technology Best Practices: Exfiltration
Monitoring
• Monitoring egress points from the internal network is
another way to improve security within the supply chain
today
• Some of the most common protocols and standards used
for data exfiltration or command and control include
HTTP/HTTPS, FTP/FTPS/SFTP, SSH, IRC, Email, P2P, and DNS
or ICMP for covert channels
• Monitor at NGFW, IDS/IPS, Proxy, and in DNS
#RSAC
Wrapping Up
#RSAC
Applying What We’ve Discussed
Next week you should:
Review your existing vendor management/procurement capabilities
In the first three months following this presentation you should:
Update product and vendor inventories
Define appropriate controls for different vendor types (check best practices
discussed earlier)
Within six months you should:
Update risk assessment processes for vendor review
Ensure all critical vendors have complete reviews & documentation

More Related Content

PDF
Integrating Cybersecurity into Supply Chain Risk Management
PDF
Vendor Security Practices: Turn the Rocks Over Early and Often
PDF
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
PDF
Make IR Effective with Risk Evaluation and Reporting
PDF
Data Science Transforming Security Operations
PDF
OWASP based Threat Modeling Framework
PDF
Partnership with a CFO: On the Front Line of Cybersecurity
PDF
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Integrating Cybersecurity into Supply Chain Risk Management
Vendor Security Practices: Turn the Rocks Over Early and Often
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
Make IR Effective with Risk Evaluation and Reporting
Data Science Transforming Security Operations
OWASP based Threat Modeling Framework
Partnership with a CFO: On the Front Line of Cybersecurity
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf

What's hot (19)

PPTX
Assuring the Security of the Supply Chain - Designing best practices for cybe...
PDF
Demystifying Security Analytics: Data, Methods, Use Cases
PDF
From Cave Man to Business Man, the Evolution of the CISO to CIRO
PDF
The Measure of Success: Security Metrics to Tell Your Story
PDF
A case for Managed Detection and Response
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PDF
Security Program Development for the Hipster Company
PDF
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
PDF
Agile Security—Field of Dreams
PDF
To MSSP or not to MSSP IISF 2015
PPTX
Cybersecurity Metrics: Reporting to BoD
PDF
CHIME Lead Forum - Seattle 2015
PDF
NISTs Cybersecurity Framework -- Comparison with Best Practice
PDF
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
PDF
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
PPSX
Does audit make us more secure
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PDF
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
PDF
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Assuring the Security of the Supply Chain - Designing best practices for cybe...
Demystifying Security Analytics: Data, Methods, Use Cases
From Cave Man to Business Man, the Evolution of the CISO to CIRO
The Measure of Success: Security Metrics to Tell Your Story
A case for Managed Detection and Response
Bridging the Gap Between Threat Intelligence and Risk Management
Security Program Development for the Hipster Company
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Agile Security—Field of Dreams
To MSSP or not to MSSP IISF 2015
Cybersecurity Metrics: Reporting to BoD
CHIME Lead Forum - Seattle 2015
NISTs Cybersecurity Framework -- Comparison with Best Practice
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
Does audit make us more secure
From SIEM to SOC: Crossing the Cybersecurity Chasm
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Ad

Similar to Building an Effective Supply Chain Security Program (20)

PPTX
Secrets for Successful Regulatory Compliance Projects
PPT
SLVA - Security monitoring and reporting itweb workshop
PDF
Best Practices & Considerations in “IT Suppliers Audit”
PPTX
Institute of Internal Auditors Presentation 2014
PDF
Roadmap to SAP® Security and Compliance | Symmetry
PPT
Audit Practice at CipherTechs
PDF
Bringing the Cloud Back to Earth
PDF
str-f02-vendor_security_practices-turn_the_rocks_over_early_and_often
PPTX
Myths of validation
PDF
Integrating Cybersecurity into Supply Chain Risk Management
PPTX
Security architecture best practices for saas applications
PDF
Introduction to NIST Cybersecurity Framework
PPTX
The Ultimate Guide To Choosing The Right Cyber Compliance Services
PDF
Introducing Assure Security Risk Assessment
PDF
2016-06-08 FDA Inspection Readiness - Mikael Yde
PPTX
Security Architecture Best Practices for SaaS Applications
PDF
TrustedAgent FedRAMP Security Authorization
PDF
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PDF
Forecast 2014: SaaS Data Exchange
Secrets for Successful Regulatory Compliance Projects
SLVA - Security monitoring and reporting itweb workshop
Best Practices & Considerations in “IT Suppliers Audit”
Institute of Internal Auditors Presentation 2014
Roadmap to SAP® Security and Compliance | Symmetry
Audit Practice at CipherTechs
Bringing the Cloud Back to Earth
str-f02-vendor_security_practices-turn_the_rocks_over_early_and_often
Myths of validation
Integrating Cybersecurity into Supply Chain Risk Management
Security architecture best practices for saas applications
Introduction to NIST Cybersecurity Framework
The Ultimate Guide To Choosing The Right Cyber Compliance Services
Introducing Assure Security Risk Assessment
2016-06-08 FDA Inspection Readiness - Mikael Yde
Security Architecture Best Practices for SaaS Applications
TrustedAgent FedRAMP Security Authorization
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
Cybersecurity Frameworks and You: The Perfect Match
Forecast 2014: SaaS Data Exchange
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PPTX
Tartificialntelligence_presentation.pptx
PDF
STKI Israel Market Study 2025 version august
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
1. Introduction to Computer Programming.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Architecture types and enterprise applications.pdf
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
August Patch Tuesday
Tartificialntelligence_presentation.pptx
STKI Israel Market Study 2025 version august
Programs and apps: productivity, graphics, security and other tools
Assigned Numbers - 2025 - Bluetooth® Document
Developing a website for English-speaking practice to English as a foreign la...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
WOOl fibre morphology and structure.pdf for textiles
1. Introduction to Computer Programming.pptx
TLE Review Electricity (Electricity).pptx
Getting Started with Data Integration: FME Form 101
Architecture types and enterprise applications.pdf
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
DP Operators-handbook-extract for the Mautical Institute
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
1 - Historical Antecedents, Social Consideration.pdf
NewMind AI Weekly Chronicles - August'25-Week II
NewMind AI Weekly Chronicles – August ’25 Week III
August Patch Tuesday

Building an Effective Supply Chain Security Program

  • 1. SESSION ID: #RSAC Dave Shackleford Building an Effective Supply Chain Security Program GRC-W02 Sr. Faculty and Analyst SANS @daveshackleford
  • 2. #RSAC Supply Chain Security: What It Means Supply chain security is a program that focuses on the potential risks associated with an organization’s suppliers of goods and services Attackers are focusing on this! There are many ways that a supply chain breach could occur Software compromise, credential theft, and more are becoming common scenarios
  • 3. #RSAC Supply Chain Breach Example: Target Target experienced a significant breach of roughly 110 million customers’ data, with at least 40 million payment cards stolen. During the course of the investigation, it was found that Target was initially breached through a connection established by one of their vendors, HVAC vendor Fazio Mechanical Services
  • 4. #RSAC Supply Chain Breach Example: Home Depot Home Depot, another large retailer, also claims that its credit card breach in 2014 was initially due to stolen credentials from a third-party vendor. In many of the most public cases we have seen, the attackers have targeted personal data, health care information and financial data, such as debit and credit card details.
  • 5. #RSAC Supply Chain Breach Example: OPM In 2015, the U.S. Office of Personnel Management (OPM) revealed a significant breach of 22 million records including sensitive data tied to numerous federal employees, contractors and military personnel. This breach, like many others, seems to have originated with stolen credentials from a background check provider that worked with OPM, KeyPoint Government Solutions
  • 6. #RSAC Getting a Handle on Vendor Management
  • 7. #RSAC Current State Not Defined • No Process Defined • Ad Hoc and Inconsistent Approach Defined & Implemented • Consistent but Unstructured Approach • Documented and Detailed but not Measured or Enforced Continuous Improvement • Monitoring, Measuring, and Process Improvements • Best Practices for Risk Management and Automation
  • 8. #RSAC Vendor Management: Define Important Vendors • Define Important Vendors • “Important” vendors can mean many things • These are vendors that: • Are critical to business operations • Maintain unique or legacy components of importance • Provide critical services
  • 9. #RSAC Vendor Management: Specify Primary Contacts • Specify primary contacts • Coordinate due diligence on vendors and report to senior leadership using a risk-based approach • Maintain knowledge of, and compliance with, policies and reporting requirements. • File documentation and paperwork with the legal and contracting teams to ensure there is a central repository and audit trail. • Coordinate broad communication with those who can add value in vendor oversight
  • 10. #RSAC Vendor Management: Establish Guidelines and Controls • Policies should include: • Requiring the right to audit and test the security controls of vendors and service providers annually, upon significant changes to the relationship and in response to audit requests or events • Requiring vendors to adhere to security monitoring requirements • Requiring periodic reports from the vendors and service providers demonstrating service level attainment and performance management • Requiring vendors and service providers to provide timely notification pursuant to any security breaches or incidents that may cause impact to the organization
  • 11. #RSAC Vendor Management: Integrate with Organization’s Practices • With the pieces in place, a vendor management program can now start to integrate with the organization’s assessment and audit practices • Depending on the industry, organization, and culture, these practices will vary widely
  • 12. #RSAC Supply Chain Security Best Practices
  • 14. #RSAC Best Practices: People • These should be in place at supply chain companies • HR Teams: Background checks should be performed on a regular basis for both new and existing employees and contractors • Every 6-12 months is ideal • Monitor all staff that work with your organization’s data and systems for changes to job status and requirements • Access to critical systems should be monitored, and all third-party access should be revoked after a defined period of inactivity
  • 15. #RSAC Best Practices: Employment Agreements • HR and security teams should verify that security requirements are clearly spelled out in contracts for supply chain personnel • Acceptable use provisions should be in place for supply chain organization employees through their employment agreements
  • 16. #RSAC Best Practices: Process • Create a supply chain assessment questionnaire and checklists: • Application security • Audit and compliance • Business continuity and disaster recovery capabilities • Change and configuration management • Data security and data life cycle management • Physical (data center) security • Encryption and key management • Governance and risk management • Identity and access management (IAM) • Infrastructure and IT operations security • Threat and vulnerability management
  • 17. #RSAC Best Practices: Process • Supply chain review should follow these guidelines: • Decide on a list of controls with which supply chain organizations need to demonstrate compliance • Determine the frequency of security reviews for internal and regulatory compliance needs • Define a remediation and arbitration process for handling supply chain organizations that are not currently meeting security requirements
  • 18. #RSAC Process Best Practices: Code Review • Code analysis of software should ideally be done for supply chain partners • Having the code reviewed should ideally be the responsibility of the vendors, and they should attest to software security via a report issued prior to installation or updates • Contracts should require this! • Pen testing of software should also be allowed in contracts
  • 19. #RSAC Process Best Practices: Vulnerability Mgmt • Supply chain vendors should have to provide patches to their products in a timely fashion • Heartbleed, Shellshock, and others have affected us significantly • SLAs should be in place for patch creation • Supply chain partners should be required to notify you of data breaches that may materially impact you • Incidents should be communicated, too…could you be the next target?
  • 20. #RSAC Best Practices: Technology • The first, and perhaps simplest, change is to begin using technology services that offer supplier risk ratings or rankings compared to other industry organizations. • Monitoring the overall risk ratings of supply chain participants from other organizations working with them provides information on industry perceptions of security posture
  • 21. #RSAC Technology Best Practices: Privileges • Vendors and partners with privileges should be controlled: • Enforce separation of duties and least privilege for accounts • Implement strict password and account-management policies and practices • Log, monitor, and audit all vendor/partner online actions • Consider a “sandboxed” approach for remote access • Most importantly, all organizations need a policy and approach to managing and monitoring privileged users
  • 22. #RSAC Technology Best Practices: Network Isolation • Network isolation and segmentation changes can help with improving supply chain security • Remote attacks through supply chain access should be limited • Careful zoning and network isolation with strategic access controls can help prevent this • Multiple authentication points (while annoying) can be useful • Logs and events from remote access systems (VPNs, etc.) should be carefully monitored • Jump boxes and “thin client” approaches are also valuable
  • 23. #RSAC Technology Best Practices: Analytics+Threat Intelligence • Many organizations use or plan to use security analytics tools and threat intelligence to help identify and combat advanced attacks • Analytics platforms provide: • Deep data sets • Pattern recognition • Machine learning • Threat intelligence can help to correlate information gleaned from internal sources with indicators of compromise spotted by other organizations
  • 24. #RSAC Technology Best Practices: Exfiltration Monitoring • Monitoring egress points from the internal network is another way to improve security within the supply chain today • Some of the most common protocols and standards used for data exfiltration or command and control include HTTP/HTTPS, FTP/FTPS/SFTP, SSH, IRC, Email, P2P, and DNS or ICMP for covert channels • Monitor at NGFW, IDS/IPS, Proxy, and in DNS
  • 26. #RSAC Applying What We’ve Discussed Next week you should: Review your existing vendor management/procurement capabilities In the first three months following this presentation you should: Update product and vendor inventories Define appropriate controls for different vendor types (check best practices discussed earlier) Within six months you should: Update risk assessment processes for vendor review Ensure all critical vendors have complete reviews & documentation