Retail Security: Third-Party Interaction

Interested in learning
more about security?
SANS Institute
InfoSec Reading Room
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission.
Retail Security: Third-Party Interaction
Copyright SANS Institute
Author Retains Full Rights
Retail Security: Third-Party Interaction
A SANS Whitepaper
Written by Eric Cole, PhD
August 2015
Sponsored by
Tenable Network Security
©2015 SANS™ Institute
Introduction
Many recent retail breaches share a common data point: They were the result of an
adversary compromising a third party and then using it as a pivot point to compromise
the retail organizations.
Although third parties offer many benefits to retailers, including providing organizations
access to services they don’t specialize in, they can often create additional security risks
and exposures. Because an adversary will always utilize the easiest, simplest and most
effective way to break into an organization, a third party with full access to the network
poses significant exposure.
Use of third parties, however, is not optional for many retailers who must control,
monitor and protect third-party access and ensure that risk is properly addressed. If an
entity from outside the private network can access sensitive information, this access is
also an easy entry point for an adversary.
Outsourcing to third
parties may reduce
workloads, but
unfortunately, it does
not reduce risk.
Outsourcing to third parties may reduce workloads, but unfortunately, it does not
reduce risk. Sometimes organizations believe that they are transferring the risk along
with the work and therefore no longer need to be concerned. In fact, the reverse is true:
Outsourcing results in an additional burden of proof on the part of the primary entity
because it cannot transfer or outsource liability. The originating party is ultimately going
to be responsible if PCI data is compromised at the third party.
In the case of financial operations covered under PCI standards, PCI requirements clearly
state that “organizations that outsource their CDE or payment operations to third parties
are responsible for ensuring that the account data is protected.”1 If the third party
breaches a contract and does not implement proper security, the retail organization
remains responsible and liable for any disclosure of PCI or personally identifiable
information.
In other words, using a third party does not relieve or reduce an organization’s
responsibility to meet PCI compliance. Although this has been true since PCI 2.0,
many organizations missed it, so PCI 3.1 is more explicit. It states that an organization
is responsible for any third parties: “Parties should clearly identify the services and
system components which are included in the scope of the service provider’s PCI DSS
assessment.”2
SANS ANALYST PROGRAM
1
PCI DSS v3.1, www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf
2
PCI DSS v3.1
1
Retail Security: Third-Party Interaction
Introduction
(CONTINUED)
The initial burden of properly securing an external connection involves due diligence
and legal, IT and security contracts to properly implement access in a secure manner.
Outsourcing also creates additional work for retailers in terms of the documentation
required for PCI compliance.
This paper provides guidance on understanding, recognizing and minimizing the risk
of exposure from third parties, including those related to supporting services covered
under PCI DSS standards.
SANS ANALYST PROGRAM
2
Retail Security: Third-Party Interaction
Risk Associated with Third Parties
If a retailer decides to utilize a third party, regardless of what the third party does, the
retailer is still liable and responsible for any breach or disclosure of information. Although
a third party can greatly increase a retailer’s productivity and cost effectiveness, the
burden of verifying that the third party is implementing proper security can erode those
cost savings. It’s therefore important for the retailer to perform a cost-benefit analysis that
compares the cost savings of using a third party with the cost of a breach. In many cases,
the thousands of dollars an organization would save per year pales in comparison to the
potential millions of dollars that could be lost due to poor security.
Furthermore, the easy, backdoor access often granted to third parties—which the
retailer might not even be aware of—provides a prime opportunity for an adversary to
compromise an organization because compromising a third party is often easier than
breaching a retailer directly. Controlling these risks therefore becomes imperative to
minimize loss and protect data. A quick Internet search will yield a long list of retailers
that have been compromised via third-party exposures.
Controlling the Security Risk: Strategic Planning
Security risks can never be completely eliminated, but they can be reduced to a
manageable level. An organization can take several actions to properly control and
manage risk in the retail environment. Note that the information needed to drive these
actions is required by PCI. Therefore, if an organization is compliant with PCI standards,
the information is readily available to perform the analysis outlined here. Figure 1 offers
an overview of the necessary actions that help control security risk.
Figure 1. Components of Risk Management in the Retail Environment
SANS ANALYST PROGRAM
3
Retail Security: Third-Party Interaction
Risk Associated with Third Parties
(CONTINUED)
Understand the Threats and Exposures
All retailers must assume that they will be targeted and attacked, and anticipating those
attacks is crucial. Through a process called attack modeling, an organization can look
at the various existing threats, correlate those with vulnerabilities and tie them back to
systems that contain sensitive information. (As noted above, this information should be
available to retailers that are PCI compliant. PCI requires retailers to perform an annual
risk assessment and understand the flow of PCI data, information that can then be used
in attack modeling.) An example of modeling is shown in Figure 2.
Malicious
Insider
Authentication
Bypass
MemoryScraping
Malware
Compromised
Credentials
Client-Side
Attack
Third-Party
Compromise
PCI Database
Server
Compromise
Compromised
Device or
Network
Figure 2. Sample Attack Model for Retail Organizations
Knowledge is indeed power when it comes to understanding how the adversary
works. Risk is reduced if a retail organization can anticipate the myriad ways in which
a compromise can occur, identify the vulnerabilities that cause the most exposure and
focus on fixing those high-risk areas. Often, an organization quickly recognizes that by
fixing one vulnerability, it can stop a large percentage of potential attacks. This kind of
discovery helps to prevent spending considerable time and money fixing insignificant
exposures. While Figure 2 illustrates one attack model, there are many other types. For
example, memory scraping is a concern with point-of-sale systems, whereas skimming
attacks target card readers at places such as gas pumps.
SANS ANALYST PROGRAM
4
Retail Security: Third-Party Interaction
Risk Associated with Third Parties
(CONTINUED)
Conduct a Data Flow Analysis
For a compromise to occur, an adversary has to gain access to sensitive information and
exploit that information. By understanding all of the possible ways that data flows, a
retail organization can better identify its exposure points and focus security on reducing
or minimizing them. Pivot points and lateral movement are integral to proper security.
Often organizations focus their efforts on securing the systems that contain sensitive
information. If the system does not contain sensitive information, the organization might
consider it low risk and fail to properly secure it. The problem, however, is that although
the system itself may not contain sensitive information (i.e., a system at a third party),
it may have direct access to another system that does. Recognizing this, an adversary
would not directly break into the most obvious system but instead target the third party,
set up a pivot point and use lateral movement to ultimately compromise the target.
Grant Least Privilege
It is often easier for a retailer to give a third party full access to the entire network than
to figure out exactly what the third party rightfully needs. But this lack of due diligence
can result in big exposure. If the third party is compromised, it means full compromise of
the retail organization as well. Security controls are a necessary cost of doing business—
and will ultimately cost less than losses resulting from a breach. As such, retailers should
ensure that third parties are provided with only minimum access up front and require
that they justify any requests for additional access. Contracts between retailers and third
parties should include specific language outlining the requirements for such integration,
networking and access controls.
Segment Information
Whereas least privilege deals with access, segmentation focuses on what information is
visible to the third party. Segmentation limits access from a network perspective. Any
system that a third party needs to access should be put on a separate, isolated network.
This way, even if the third party is compromised and the adversary can compromise the
retailer, the attacker will have only limited access to the retailer, thereby controlling the
amount of damage. Third-party access should never be directly connected to the main
network. There should always be a separate segment with controlled access set up for
the third party. Although this approach is not required by PCI, it is highly recommended.
SANS ANALYST PROGRAM
5
Retail Security: Third-Party Interaction
Risk Associated with Third Parties
(CONTINUED)
Implement a VPN with Robust Authentication
Any third party that needs access to a retailer should have proper credentials
established, utilize robust authentication (i.e., two-factor authentication) and connect
via a secure channel—all of which are PCI requirements. Ideally, organizations should
track, monitor and control each third-party individual accessing systems, which is not
always feasible with large outsourcing projects. But the retailer should make every effort
to control, track and manage all access.
SANS ANALYST PROGRAM
6
Retail Security: Third-Party Interaction
Discovering and Identifying Third Parties
According to PCI,3 a third party is any non-employee entity, including individuals,
primary contractors and sub-contractors, that performs services and/or has access to
company information. Identifying all third parties that have access to an organization is
not only critical for security but also for PCI compliance. Although third parties greatly
enhance the services an organization offers, they also increase the risk of exposure and
compromise sensitive information.
The first thing an organization needs to do is identify any and all third parties that
have access to card data in terms of “transmit, process, store” or any access that could
impact the security of cardholder data. Making this determination can be challenging
because sometimes outsourcing happens without making other units in the business
aware of such business arrangements. In other cases, the outsourcing arrangement
starts out small and is planned for only a short time, so the organization may consider it
too insignificant to tell security about. But when due diligence, contract validation and
security controls are insufficient at the outset, there will likely be problems if that small
contract grows and becomes a key fabric of the business.
Identification of third parties, then, should begin with a review of contracts, legal
documents, and purchasing and procurement procedures. Even small contractors have
to be under contract to get paid, so looking at the legal documents related to their
engagement with the organization is a reliable way of identifying third parties. In those
instances where security is out of the loop, any entities involved with contracts and
payment often have a good idea of the third-party profile within an organization.
Identify third parties by asking business units, managers or others the following questions:
• D
oes your team work with any third parties (i.e., contractors, business partners,
service providers, individuals or anyone who is not an employee)? Note that it is
critical to clearly define what constitutes a “third party.” For example, a third party is
any individual or entity providing some fee-based service that supports or enables
company business. Contractors such as outsourced IT are sometimes considered
the same as employees. One way of determining this is to find out whether they
have domain credentials.
• D
oes any third party have access to systems on our network? Third parties might
also be in the payment path.
• D
oes any third party receive emails or data transfers that contain organizational or
sensitive information?
• C
an you provide all contracts that you have with third parties that provide any
services to the organization?
3
SANS ANALYST PROGRAM
PCI DSS v3.1, www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf
7
Retail Security: Third-Party Interaction
Discovering and Identifying Third Parties
(CONTINUED)
After identifying all the services that are outsourced and related agreements or
contracts, identify what information can be accessed by the third party and the
sensitivity of that information. Be sure to define access as both direct and indirect.
For example, a third party might be given access to a server that contains public
information, but if that server is on the same network as another server that contains
sensitive information and the credentials for accessing that server are the same,
technically that third party has access to sensitive information.
Next, contact the third parties to identify security measures already implemented or
slated for implementation. Here are some questions to ask:
• D
oes sensitive information reside on computers that do not belong to you? If so,
what information and where is it stored?
• What data classification and protection mechanisms are in place?
• D
o security policies exist, and are there specific sections related to third-party
information?
• D
o you perform logging of all access to company information? How long are your
logs preserved, and where are they stored?
Organizations may have a high
tolerance for risk—until they
suffer a major breach.
• Is information about your business segmented from that of other clients? What
level of security is implemented to protect this information?
• H
ow do you monitor and detect potential breaches, and how would we be notified
in the event of a breach?
After your organization identifies its third parties, it can assess overall security posture
and calculate the risk associated with their use. If the risk exceeds an acceptable level
(which is likely), remediation measures need to be implemented to minimize the risk.
Typically, such measures include reducing visibility, controlling the flow of information,
detailed logging and authentication.
The acceptable level of risk is defined by the risk appetite of the executive team
and board of directors. It is also closely tied to the security budget. The less risk an
organization can tolerate, the more it must spend on security. Organizations may have a
high tolerance for risk—until they suffer a major breach.
If retailers outsource any aspect of PCI information or compliance, additional due
diligence must be performed. The retailer must decide whether it will utilize only third
parties that are already PCI compliant or make the effort to ensure that the third party is
fully compliant. It is also important to validate exactly which PCI DSS requirements are
being met by the third party.
SANS ANALYST PROGRAM
8
Retail Security: Third-Party Interaction
Best Practices: Tactical Implementation
Retailers rely on third parties to help them run effective, low-cost and efficient
businesses. The following best practices will help organizations achieve that goal and
maintain associated security risks at an acceptable level:
• I dentify what access is required. Although it’s easier to grant third parties full
access to the network, it also creates significant risk and exposure. For each vendor,
create a list that indicates the access required for specific data and systems.
• C
reate clear control gates for access. Instead of allowing a third party to have
full access to a network, a separate DMZ should be set up to clearly control and
manage all vendor access in and out of the organization. Creating a clear control
gate makes access easy to manage, verify and control.
• I mplement strict access control. Verify that the vendor only has the access it
needs and nothing more. While tracking this takes more time and effort up front,
the amount of time and money spent on due diligence will be a lot less than the
cost of a breach—which becomes much more likely if this step is overlooked.
• M
onitor all access. Because adversaries often use the access established by a
third party to compromise a retailer’s systems, all access coming from the thirdparty organization must be carefully monitored. The behavior of a third party
performing legitimate activity will be significantly different than the behavior of
an adversary that has compromised the third party. By carefully monitoring and
building a pattern of normal activity, deviations can be identified and used to
trigger response.
• S
can and verify access. Claiming to have security is a lot different than verifying
security measures are properly implemented and working correctly. When
breaches occur, often the target organization will say that it thought it had proper
security. Security managers didn’t know something had either stopped working or
hadn’t been implemented correctly—and no one noticed. Perform active scanning
with technical verification to verify that everything is optimally configured and
working the way it was designed to work.
• I nsert security service level agreements (SLAs) in the contract. Define clear
metrics with explicit language in the contract that require the third party to meet
a certain level of security. In addition to clear metrics tied to SLAs, penalties should
be identified if the third party fails to meet those requirements.
• R
equire security reports and validation from vendor. On a regular basis, the
third party should provide explicit security reports showing adherence with
contract terms and metrics. Additional reports should be provided indicating
whether security protocols are properly implemented to protect the retailer’s
sensitive information. This information should be tied to SLAs that define penalties
if the reports are not provided.
SANS ANALYST PROGRAM
9
Retail Security: Third-Party Interaction
Summary
The more an organization knows about its infrastructure and location of sensitive
information, the better it can protect high-value data, ensure operational integrity and
comply with PCI requirements. Any third party that has access to an organization’s
infrastructure, network or data must also be included within the security plan.
Outsourcing doesn’t relieve organizations of their security obligations.
After becoming familiar with the PCI requirements, organizations need to learn how to
identify third parties, clearly define and limit their access, and put safeguards in place to
ensure that their actions do not compromise the organization’s overall security or data.
Best practices should include the following items outlined in this paper:
• Identify what access is required.
• Implement strict access control.
• Monitor all access.
• Scan and verify access.
• Create clear control gates for access.
• Insert security SLAs in the contract.
• Require security reports and validation from vendor.
Any time third parties are utilized, the organization must take the extra steps to ensure
that all access is properly verified and validated. Be sure not to underestimate the
importance of executive buy-in. Critical to success are executives who are strongly
motivated by the economic benefits of reliance on third parties to make security an
equal priority.
SANS ANALYST PROGRAM
10
Retail Security: Third-Party Interaction
About the Author
Eric Cole, PhD, is a SANS faculty fellow, course author and instructor who has served as CTO of
McAfee and chief scientist at Lockheed Martin. He is credited on more than 20 patents, sits on
several executive advisory boards and is a member of the Commission on Cybersecurity for the 44th
Presidency. Eric’s books include Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight,
Network Security Bible and Insider Threat. As founder of Secure Anchor Consulting, Eric puts his 20-plus
years of hands-on security experience to work helping customers build dynamic defenses against
advanced threats.
Sponsor
SANS would like to thank this paper’s sponsor:
SANS ANALYST PROGRAM
11
Retail Security: Third-Party Interaction
Last Updated: June 15th, 2017
Upcoming SANS Training
Click Here for a full list of all Upcoming SANS Events by Location
DFIR Summit & Training 2017
Austin, TXUS
Jun 22, 2017 - Jun 29, 2017
Live Event
SANS Paris 2017
Paris, FR
Jun 26, 2017 - Jul 01, 2017
Live Event
SANS Cyber Defence Canberra 2017
Canberra, AU
Jun 26, 2017 - Jul 08, 2017
Live Event
SANS Columbia, MD 2017
Columbia, MDUS
Jun 26, 2017 - Jul 01, 2017
Live Event
SEC564:Red Team Ops
San Diego, CAUS
Jun 29, 2017 - Jun 30, 2017
Live Event
SANS London July 2017
London, GB
Jul 03, 2017 - Jul 08, 2017
Live Event
Cyber Defence Japan 2017
Tokyo, JP
Jul 05, 2017 - Jul 15, 2017
Live Event
SANS Los Angeles - Long Beach 2017
Long Beach, CAUS
Jul 10, 2017 - Jul 15, 2017
Live Event
SANS Cyber Defence Singapore 2017
Singapore, SG
Jul 10, 2017 - Jul 15, 2017
Live Event
SANS ICS & Energy-Houston 2017
Houston, TXUS
Jul 10, 2017 - Jul 15, 2017
Live Event
SANS Munich Summer 2017
Munich, DE
Jul 10, 2017 - Jul 15, 2017
Live Event
SANSFIRE 2017
Washington, DCUS
Jul 22, 2017 - Jul 29, 2017
Live Event
Security Awareness Summit & Training 2017
Nashville, TNUS
Jul 31, 2017 - Aug 09, 2017
Live Event
SANS San Antonio 2017
San Antonio, TXUS
Aug 06, 2017 - Aug 11, 2017
Live Event
SANS Hyderabad 2017
Hyderabad, IN
Aug 07, 2017 - Aug 12, 2017
Live Event
SANS Prague 2017
Prague, CZ
Aug 07, 2017 - Aug 12, 2017
Live Event
SANS Boston 2017
Boston, MAUS
Aug 07, 2017 - Aug 12, 2017
Live Event
SANS New York City 2017
New York City, NYUS
Aug 14, 2017 - Aug 19, 2017
Live Event
SANS Salt Lake City 2017
Salt Lake City, UTUS
Aug 14, 2017 - Aug 19, 2017
Live Event
SANS Adelaide 2017
Adelaide, AU
Aug 21, 2017 - Aug 26, 2017
Live Event
SANS Virginia Beach 2017
Virginia Beach, VAUS
Aug 21, 2017 - Sep 01, 2017
Live Event
SANS Chicago 2017
Chicago, ILUS
Aug 21, 2017 - Aug 26, 2017
Live Event
SANS Tampa - Clearwater 2017
Clearwater, FLUS
Sep 05, 2017 - Sep 10, 2017
Live Event
SANS San Francisco Fall 2017
San Francisco, CAUS
Sep 05, 2017 - Sep 10, 2017
Live Event
SANS Network Security 2017
Las Vegas, NVUS
Sep 10, 2017 - Sep 17, 2017
Live Event
SANS Dublin 2017
Dublin, IE
Sep 11, 2017 - Sep 16, 2017
Live Event
SANS Minneapolis 2017
OnlineMNUS
Jun 19, 2017 - Jun 24, 2017
Live Event
SANS OnDemand
Books & MP3s OnlyUS
Anytime
Self Paced