Educause Security Discussion mailing list archives
Re: HECVAT Security Assessment Question
From: "Davis, Kevin" <kedavis () DAVIDSON EDU>
Date: Wed, 19 Jul 2017 18:43:04 +0000
One other data point to add to the discussion. We are in the market for an HR benefits solution and HR's outside consultant, a household name in the field as far as I’m concerned, opined that they had never seen an organization of our relatively small size ask the level of detailed questions seen on the (full) HECVAT. This raises another challenge we have to think about in re HECVAT — as a small college, the revenue/profit our deal will bring may be insufficient to motivate a detailed reply, vs what a large research-intensive university/academic medical center org can justify. We were largely using HECVAT Lite but expect we will switch to Lite for all requests, and just assess individual full-version questions where required by compliance... Kevin -- Kevin Davis Deputy CIO & Director, Core Services Davidson College ITS On 7/13/17, 11:56 AM, "The EDUCAUSE Security Constituent Group Listserv on behalf of Velislav K Pavlov" <SECURITY () LISTSERV EDUCAUSE EDU on behalf of VelislavPavlov () FERRIS EDU> wrote:
Rob, it's common for vendors to refuse to complete the risk assessment. Especially if they don't have their act together when it comes to assuring information security and privacy. We transitioned to using HECVAT as a template, but we also request attestation in the form of qualified third party assessment. This can be PCI DSS, HIPAA audit, NIST 800-30 audit, ISO27001 certificate, proof of on-going vulnerability discovery and remediation, SSAE16 SOC 2 Type 2, CSA STAR, etc. It depends on the type of data and compliance requirements surrounding it. When we receive push back from the vendor or the institution, we resort to due care and due diligence. In our risk analysis, we assess qualitative and quantitatively the risk, exposure, impact, and likelihood based on discovered vulnerabilities and the identified type of data and attack surface. We make a recommendation that the risk is low, medium, high, or critical. We outline what the risk is and specify recommended corrective actions which are actionable. If the University leadership decides to accept the risk, we ask them to complete risk acceptance form. It raises awareness that my team has done our due care and diligence to do our job and help our leadership make educated decisions. It specifies why the risk is acceptable and requires sign off from the VP, Dean for the area, IT Security, and the CTO/CIO. Please let me know if you are interested in the risk assessment form or acceptance. I can share via email. Vel Pavlov | Coordinator, IT Security M.Sc. ISM, CISSP, C|HFI, C|EH, C)PTE, Security+, CNA, MPCS, ITILv3F, A+ VelPavlov () ferris edu Notice:This email message and any attachments are for the confidential use of the intended recipient. If that isn’t you, please do not read the message or attachments, or distribute or act in reliance on them. If you have received this message by mistake, please immediately notify VelPavlov () ferris edu and delete this message and any attachments. Thank you. -----Original Message----- From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Rob Milman Sent: Thursday, July 13, 2017 11:30 AM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: Re: [SECURITY] HECVAT Security Assessment Question **Notice** This message is from a sender outside of the Ferris Office 365 mail system. Use caution when clicking links or opening attachments. For assistance determining if this email is safe, please contact TAC. ________________________________ Hi everyone, I've been watching this thread with interest. We made the decision to begin using the HECVAT this spring to replace our SaaS assessment that was just not detailed enough. I current am working on 5 different engagements with cloud service providers and 3 of them have outright refused to complete the HECVAT. The other 2 are being evaluated and they haven't got back to me yet. Some of the vendors that have rejected the HECVAT have provided their own documentation, but I can find no evidence of a third-party assessment. We have gone as far as telling the institution that we cannot support the cloud vendor as a risk assessment was not completed, the institution has gone ahead and signed contracts with these vendors anyway, without our acceptance. Has anyone else had vendors refuse to complete the HECVAT? What has been the result? Is there a lighter version of the HECVAT that you would be willing to share? Our institution is beginning to question the hard line we have taken with regards to cloud vendors, we may have to stand down. Thanks, Rob -----Original Message----- From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of José A. Domínguez Sent: Monday, July 10, 2017 4:45 PM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: Re: [SECURITY] HECVAT Security Assessment Question Hello Sue. Your approach seems similar to what I am trying to do at UO. I am engaging the office of Purchasing and Contracting Services and working on adopting HECVAT as part of their evaluation criteria for vendor selection. That way it's part of what the vendors need to do if they want our business and it's part of what departments need to look for when engaging businesses. The question is agreeing on what kind of cloud service solution requires what level of evaluation. I'll let you know how successful this approach is. José. On 7/7/17 5:14 AM, Sue McGlashan wrote:Hi Mark You derailed the conversation exactly into what I was talking about yesterday within our team - speediness vs effectiveness. We need to be both effective and efficient, but effective does take time. Please see more below, and thank you for opening the conversation. > At Brown, we are trying to move towards adopting HECVAT/HECVAT Lite for all vendor assessments as well. So far, we haven’t run into the IBM scenario yet and we had our first instance of a vendor (Workfront) who had already seen it and turned it around almost instantly, thanks for whomever forged the way for us! > If I could derail this conversation slightly, I’d be really interested in learning what your staffing to support vendor assessments looks like. We seem to be continuously trying to play catch up with assessments Yes, we play a game of catch up all of the time, and any delayed projects seem to arrive in the middle of a high volume of projects, not when we had planned time to complete them … we all know this story - and I am sure you all also have internal projects, and you probably also need to look at both privacy and security. > and it’s taking way more time than the cycles we have allotted. A vast majority of our time seems to be tied up in chasing down information and getting people to actually respond! Agreed about the time, and to make it worse, sometimes the response is poor, so although a questionnaire is provided, it is filled in by marketing, or else the vendor has a weak security team - i.e. we cannot use it as is. Solution? - Please let me know if you have other suggestions. I am adjusting our process - we need a better intake, so that as vendor responses comes in, we quickly review the supplied documentation, and immediately contact the vendor if the information is inadequate. This should reduce the overall time per project, but it will interrupt current projects. I am hoping for a longer-term win. > Although in some cases, wading through the reams of documentation from a vendor can take significant time as well. At present, our team of two-part time people (very part time on paper for at least one of these anyways) seems to be consistently trying to do contract reviews and security assessments on just North of 20 contracts concurrently. I’m trying to figure out if we are just hugely inefficient, we are attempting to be too detailed in our reviews, or we are truly understaffed. Are we the only ones in this situation? Anyone have a better model? > Mark Overall, it takes time! I am looking at how we can more efficiently complete an assessment, but I do not want to change to a check box approach since we have discovered some concerns that such an approach would not have. However, when I asked the team to be more efficient, that was interpreted as rushing the work, resulting in the need to re-review some of the assessment. No, you are not the only ones in this situation. If we decide an assessment must be completed, we should be thorough. Yes, I think if we are to do all of the assessments, we will need more staff. (but e.g. workfront - hopefully in the longer term we will be able to share the results of our security reports/assessments, so we are also not each individually reviewing each vendor). But could we triage better? Probably. We are working towards a self-assessment for some smaller internal applications, followed by providing an application vulnerability scan, and random full assessments. This idea evolved from listening to talks at the Educause conference. Thanks Sue McGlashan
Current thread:
- Re: HECVAT Security Assessment Question, (continued)
- Re: HECVAT Security Assessment Question Joel McKenzie (Jul 13)
- Re: HECVAT Security Assessment Question Ruth Ginzberg (Jul 13)
- Re: HECVAT Security Assessment Question Andy Hooper (Jul 14)
- Re: HECVAT Security Assessment Question Sue McGlashan (Jul 14)
- Re: HECVAT Security Assessment Question Rob Milman (Jul 14)
- Re: HECVAT Security Assessment Question Brad Judy (Jul 13)
- Re: HECVAT Security Assessment Question Velislav K Pavlov (Jul 13)
- Re: HECVAT Security Assessment Question Brown,Thomas (Jul 13)
- Re: HECVAT Security Assessment Question Escue, Charles E (Jul 14)
- Re: HECVAT Security Assessment Question Brown,Thomas (Jul 14)
- Re: HECVAT Security Assessment Question Davis, Kevin (Jul 19)
- Re: HECVAT Security Assessment Question Shelton Waggener (Jul 19)