Fourth-Party Risks

🔐 Fourth-Party Risks: The blind spot in third-party vendor security

As organizations, we’ve made real progress in managing third-party risk; vetting vendors, signing DPAs, and running due diligence checks. But there’s a quieter, deeper layer we often overlook: fourth-party risk.


💥 This is the exposure we inherit from our vendors’ vendors; the cloud providers, subcontractors, and invisible dependencies woven into our digital supply chains.


🤔 Why fourth-party risk continues to be a source of concern for us:


- 🧱 We have limited visibility into who our vendors rely on.

- 📉 Their security posture impacts us; even when we have no contract with them.

- 🔗 We’re accountable for compliance failures tied to someone two degrees removed.

- 🛑 An outage or breach downstream can take us down, too.


🎯 One notable example? The 2021 Kaseya ransomware attack. Thousands of companies downstream were impacted; many of whom didn’t even know they were connected (Kaseya VSA ransomware attack).


🛠 So what are we doing, and what should we be doing, as security leaders?

- 🏗️ Asking vendors to share who they rely on (think: SBOMs and transparency).

- 📃 Including fourth-party controls in contracts and SLAs.

- 📊 Using tools to monitor not just vendors, but their ecosystems.

- 🕵🏽‍♂️ Practicing zero trust and preparing for breakdowns beyond our direct control.


🔎 Supply chain trust is no longer linear; it's layered, and it’s inherited. If we don't go beyond third-party risk, we're not seeing the full map. ⛓️

Comentarios

Entradas populares