From: Financial Times
By Paul Taylor
Supply chains have emerged as a critical and integral part of how organisations operate and compete in the marketplace today, says Michael de Crespigny, chief executive of the UK-based Information Security Forum (ISF).
But that also makes them a target for hackers and other cyberthieves, a reality that has prompted Mr de Crespigny to launch a new initiative.
Mr de Crespigny is leading a project to examine how to collaborate and share intelligence that would enable organisations to be sure information in their supply chains is secure. The idea is to align the myriad of approaches into a security framework that would provide organisations with a degree of assurance about how their information is being protected.
The ISF chief executive notes that in spite of the development of supply chain and supply chain risk management, which typically focus on the physical security and risks of supply chains, the security of information – which may be as valuable as the physical product and may be required for the supply chain to function – is typically addressed in a less rigorous manner. “Supply chains are now not just concerned with physical product,” he says.
As the chief information officer from an ISF member in the food manufacturing and consumer goods sector states: “We now have to deal with the digital supply chain – the supply, operation and maintenance of our internet and cyber presence and our electronic commerce channel.”
The increasing importance of information and information technology in the supply chain and the need to share information was mentioned in a recent World Economic Forum report (New Models for Addressing Supply Chain and Transport Risk, 2011). That report identified the availability of shared data and information as the second biggest network vulnerability – just behind the reliance of supply chains on oil.
“The risk of shared data being compromised is one of the key risks in the supply chain,” says Mr de Crespigny. “The sharing of information across multiple tiers in a supply chain magnifies that risk and many organisations find it difficult to understand or track where their information goes.”
“The most important piece of analysis required is what information is shared,” adds another ISF member and information security officer working in a financial organisation. “After that, you have to deal with the fact that you have a degree of control over your information in tier one: but in tier two and beyond, you have very little or no visibility or control.”
But that loss of visibility and control over information does not mean that responsibility for protecting that information goes away under some statutes. Although organisations can do vendor comparisons, rely on service level agreements or contracts, or perform audits to provide a level of assurance at the top level of their supply chain, those approaches typically do not work below that tier.
“Trying to understand what information goes where and how well it is protected is a significant issue, because information flows wherever and whenever it’s needed. Your supply chain and its information content are dynamic,” says a procurement officer from a global manufacturer and forum member.
Unfortunately this picture is further complicated by a profusion of standards and guidance on supply chain information security and audit, according to Mr de Crespigny. Various standard setting bodies, including the International Standards Organisation, supply chain management professional bodies, financial services and the audit bodies, have all published material in this field.
However, this material varies in scope, in purpose, the level of detail specified and in outcomes; little, if any, is cross-referenced or mapped. “This lack of cross-referencing and mapping means that requirements and results cannot be shared or interpreted, hindering efforts to both harmonise results and assist organisations to secure their supply chains and related information,” says Mr de Crespigny.
From an information security perspective, he notes that many standards and guidelines focus on the protection of information inside the organisation; how it is protected externally, as in a supply chain, has only recently been addressed and usually in an ad hoc manner. Additionally, much of the deployment and implementation of information security controls is risk-driven, meaning that different organisations deploy different controls because they perceive the risk differently.
Overlaying the confusion of supply chain information standards are the varying legal requirements in different geographies. Since supply chains often span two or more countries, supply chain managers have been accustomed to dealing with differing legal frameworks for the supply, delivery and shipping of goods and raw materials – and the inevitable conflicts that arise.
Today, those same managers are dealing with information-related laws, such as data privacy and breach notification. Many of these information-related laws require that organisations adopt specific approaches or even technologies to protect information.
As a result of these multiple, overlapping and conflicting standards, guidelines and laws, acquirers and suppliers find it difficult to communicate clearly about information and its protection. Typically, a supplier will be required to follow the acquirer’s information security policy, but for a supplier with multiple acquirers, that means adopting multiple policies, providing multiple reports and answering multiple review, assessment or audit questions on similar if not identical topics.
To address this issue and provide a common framework to communicate requirements and measure performance, the forum has launched the Supply Chain Information Security Assurance Framework. The initiative, which is a collaborative venture involving standard setting organisations, supply chain bodies, auditors, acquirers and suppliers, will focus on integrating existing standards and guidelines, including the ISF Standard of Good Practice and common baseline for external suppliers.
“The aim of the initiative is to provide a ‘Rosetta Stone’ for securing and assuring information in the supply chain,” says Mr de Crespigny. “The benefits of doing this will be wider adoption, better risk management and increased reliability and resilience for our businesses and supply chains.”
![Share on Facebook Facebook](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/facebook.png)
![Share on Twitter twitter](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/twitter.png)
![Share on Google+ google_plus](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/google_plus.png)
![Share on Reddit reddit](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/reddit.png)
![Pin it with Pinterest pinterest](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/pinterest.png)
![Share on Linkedin linkedin](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/linkedin.png)
![Share by email mail](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/mail.png)
Leave a Reply