Security Best Practice for Managing Third Parties

Treasury and Trade Solutions
Security Best Practice for Managing
Third Parties
Cybercrime is now widely cited as a primary risk to the global economy. Security should
extend outside your organisation to the broader ecosystem of vendors, partners, and
other third parties.
The below short guide has been drafted to help you review
aspects of your outsourced relationships and to assist in
reducing fraud and cyber risks.
According to a 2016 KPMG survey of professionals who
investigated 750 frauds between March 2014 and August
2015, for the majority of organizations, their anti-fraud
controls are not strong enough. This survey found that
weak internal controls were a contributing factor in no
less than 60% of frauds. Fraud threats are constantly
changing and organizations need to conduct regular risk
assessments, examining whether the controls in place are
fit-for-purpose or need to be changed and adapted in the
light of the evolving fraud and cybersecurity landscape.
security and risk requirements. There have
been numerous cases where access to a secure
network is facilitated by weak controls on a
seemingly unimportant component or system.
Comprehensive ‘Third Party Information Security
Assessment Policy’ and associated compliance
verification processes are required. Information
security is an important area of focus to ensure that
intellectual property and/or sensitive user data is
secured by the third party. Intellectual property and/
or user data should be secured.
Periodic and surprise reviews and/or independent
audits are recommended to confirm standards are
being adhered to in relation to information security.
The frequency and scope of these reviews/audits
should be proportional to risk. Audits should be
carried out by an independent trusted party to
confirm that agreed processes and levels of security
are maintained to a high standard and that gaps are
identified and correction actions are documented
and actioned.
Vulnerability and risk assessments of third party
systems managing critical processes or data should be
conducted and reviewed frequently. Depending on the
level of risk, external as well as internal assessments
should be undertaken. Gaps identified should be
tracked through remediation.
In our opinion the best defensive systems consist of several
layers so that a single point of failure does not allow a
breach. In addition to a protective layer, further safeguards
can be provided by a detection layer that provides on-going
monitoring. Organisations should also develop an easily
accessible response plan in case the initial defence fails, the
response plan should seek to minimise the extent of any attack.
Some basic checks that can reduce
your risk exposure are as follows:
All third parties that provide critical services
or that have access to sensitive information
should meet or exceed internal information
Intellectual property, personally identifiable
information, transactional capabilities and other
high risk information/functions should be protected.
Consider the impact to your business, both financial
and reputational, if such data was to fall into the
wrong hands.
For third party employees who will be accessing
your systems or data, consider implementing
strict procedures such as background checks, staff
rotations, training, entitlements and access reviews
as well as mandatory absences. Employee due
diligence should be considered an extension of your
own high standards.
Ensure secure connectivity in communications with
a third party including firewalls, encryption, and other
mechanisms to protect data and systems. A minimum
standard of security in these communications should
be agreed up front and should be validated as part of
vulnerability assessments.
Segregation of duties should be implemented for
higher risk activities, this should be backed up by
audited policies & procedures and password controls.
Segregation and restrictions of access to systems
should be considered where “high risk” systems
are accessible on the same network segment and
comingled with other systems/data.
An issue management plan and response process
should be in place and tested in case of any data/
system breach or malfeasance. It is important to
agree on the components of a response process as
well as transparency of any internal reporting.
Physical site security should also be reviewed. Ensure
that minimum standards are agreed for both primary
and COB premises as required.
Policies relating to data retention, storage, and privacy
should be in place. Privacy and data retention policies
should be agreed and clearly set out how, where and
for how long data will be stored.
Please note that it is important to contact your
bank immediately and advise them of any fraudulent
activity, doing this as soon as possible may reduce
the impact of a fraud.
Treasury and Trade Solutions
transactionservices.citi.com
© 2016 Citibank, N.A. All rights reserved. Citi and Citi and Arc Design is a service mark of Citigroup Inc., used and registered
throughout the world. The information and materials contained in these pages, and the terms, conditions, and descriptions that
appear, are subject to change. Not all products and services are available in all geographic areas. Your eligibility for particular
products and services is subject to final determination by Citi and/or its affiliates. Any unauthorised use, duplication or disclosure
is prohibited by law and may result in prosecution. Citibank, N.A. is incorporated with limited liability under the National Bank Act
of the U.S.A. and has its head office at 399 Park Avenue, New York, NY 10043, U.S.A. Citibank, N.A. London branch is registered
in the UK at Citigroup Centre, Canada Square, Canary Wharf, London E14 5LB, under No. BR001018, and is authorised and
regulated by the Office of the Comptroller of the Currency (USA) and authorised by the Prudential Regulation Authority. Subject
to regulation by the Financial Conduct Authority and limited regulation by the Prudential Regulation Authority. Details about
the extent of our regulation by the Prudential Regulation Authority are available from us on request.. VAT No. GB 429 6256 29.
Ultimately owned by Citi Inc., New York, U.S.A.
GRA26733 07/16