VENDOR RISK COUNTDOWN - Top 10 Risks Third-Party Vendors Pose to Your Financial Institution

Page created by Jonathan Walton
 
CONTINUE READING
VENDOR RISK COUNTDOWN - Top 10 Risks Third-Party Vendors Pose to Your Financial Institution
VENDOR RISK COUNTDOWN
                                    Top 10 Risks Third-Party
                                      Vendors Pose to Your
                                        Financial Institution

Ncontracts.com | 888.370.5552
EXECUTIVE SUMMARY: Vendor risk management is an ongoing
                 process. It begins with due diligence before a contract is signed and
                 continues with monitoring throughout the length of the relationship.
                 Based on the inherent risk with the vendor, the financial institution
                 should assess the potential risks of third-party vendors in some or all
                 of these 10 risk categories: operational, transaction, compliance,
                 credit, strategic, reputation, cyber, cloud, concentration and country.

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                        Ncontracts   2
UNDERSTANDING VENDOR RISK                                 vendor like high, important, critical. It is
                                                          certainly not a good use of resources nor
When it comes to traditional lending risk,                a requirement to perform extensive due
banks and credit unions have it down pat.                 diligence before ordering a delivery from
They can look at customers and quickly                    a sandwich shop. However, there is a big
determine whether they are a good risk.                   difference between the coffee vendor and
They carefully project interest rate risk.                the core processor.
Theycan cite liquidity figures off the tops of
their heads. But when it comes to vendor                  If the financial institution policy is not well
management, it gets trickier.                             crafted, then it can easily create an enormous
                                                          amount of work, which is not required by
Third-party providers play a valuable role at             regulatory guidance. By comparison, a well-
financial institutions, allowing FIs to compete           crafted policy will align inherent risk groups
by offering a broader and more cost-effective             with control processes that align efforts with
mix of products and services, but they also               the risks that need to be mitigated. While the
pose risks. Every action (or inaction) a vendor           guidance from federal regulators is targeting
takes has the potential to help or harm the FI.           critical, significant, or high risk vendors like
It is similar to hiring an employee, because the          core processors, each FI wants an inherent
FI is responsible for the employee’s actions              risk system that protects them from third
or inactions. This responsibility makes proper            party risk.
due diligence and oversight of vendors a
necessary part of the outsourcing process.
FIs must be able to assess the potential
risks a vendor poses and then measure how
effectively that company mitigates risk.

This is an important task, and not just because
regulators require it. Careful risk assessment
and monitoring lets FIs know which vendors
pose which risks, and whether the products
and services a vendor provides deliver enough
value to make up for the additional risk. It also
reveals how much oversight and monitoring
a specific vendor requires. Some FIs utilize
labels to identify the inherent risk posed by a

      FIs must be able to assess the potential risks a vendor poses and
          then measure how effectively that company mitigates risk.

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                      Ncontracts      3
These risks from critical vendors come in many            1. OPERATIONAL RISK
forms, with new threats regularly emerging.
It’s also a comprehensive process. Regulators             One of the broadest risks facing FIs that
expect FIs to address specific categories of              outsource is operational risk. Operational risk
risk for this type of vendor. Unfortunately,              is the risk of financial loss when processes,
there is often overlap between the areas. FIs             people or systems fail. Sometimes it’s the
that choose to address risk in silos run the risk         result of external events like a power outage,
of duplicate efforts, contradictory results and           fire or flood. Other times it’s the vendor’s own
missed connections that result in shortfalls.             internal issues, such as fraud, a hardware or
This is especially true since vendor risk                 software failure or an accounting error.
management is an ongoing process, which
begins with due diligence before a contract               While it’s impossible to guarantee that
is signed and continues with monitoring                   processes, people and systems are perfect,
throughout the length of the relationship.                there are steps FIs can take to mitigate
                                                          these risks. The key is ensuring that vendors
 Due diligence should cover all the major risks           carefully and consistently follow suitable
vendors pose. While different regulators use              and effective internal controls. Many vendors
different names for different kinds of risk and           will provide the results of SOC 2 Type 2
some emphasize certain types more than                    audit tests to address non-financial business
others, these are the top ten risks:                      controls in areas such as security, availability,
                                                          processing integrity, confidentiality and data
 1   Operational risk
                                                          privacy. This is a great starting point. Because
 2   Transaction risk                                     operational risk is such a broad area, there
 3   Compliance risk                                      are many areas to review. The good news is
                                                          that many of these facets appear later when
 4   Credit risk
                                                          discussing other forms of risk. FIs that invest
 5   Strategic risk                                       time in careful due diligence will see the
 6   Reputation risk                                      benefit when that work can be applied to
                                                          other areas.
 7   Cyber risk
                                                          Subjects to review include:
 8   Cloud risk
                                                          Data privacy. Governing access to electronic
 9   Concentration risk
                                                          data and systems containing confidential
10   Country risk                                         client data is essential. Policies and controls
                                                          should ensure the consistent security and
Let’s take a closer look at each of these areas           confidentiality of customer information,
to understand what steps FIs should take                  including secure data disposal, data
to investigate the risk exposure a vendor                 classification and confidentiality or non-
presents.

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                       Ncontracts     4
disclosure agreements. There should be                    annually. There must be documented
physical access restrictions at buildings,                mandatory training and escalation procedures
computer facilities and records storage                   to address staff who fail to take training.
facilities where customer data is stored.
Customer information should be encrypted                  Monitoring. Systems should be monitored
whether it’s in transit or storage.                       with controls to detect actual and attempted
                                                          attacks and intrusions into customer
Threat assessment. There should be                        information systems. They should also protect
procedures to identify, assess and mitigate               data systems from theft and corruption.
reasonably foreseeable internal and external              Penetration tests and/or vulnerability scans
threats that could result in unauthorized                 should validate the integrity of system
disclosure, misuse, alteration or destruction             security, and findings should be promptly
of customer information or systems                        investigated and resolved.

Governance. Both the board and management                 Incident response. There should be a plan
should play a role in oversight. That includes            of action when unauthorized access to
definingroles and responsibilities, segregating           information systems or facilities is suspected.
duties and work environments and maintaining              Protocols should define the customer breach
change management controls over software                  notification process along with a process for
changes, application development and system               addressing customer requests and complaints.
maintenance.
                                                          Data security. Measures should protect
                                                          confidential customer information and
While it’s impossible to guarantee that
                                                          systems from destruction, loss or damage
processes, people and systems are
                                                          due to environmental hazards, failures
perfect, there are steps FIs can take to
                                                          or disasters. There should be periodic
mitigate these risks.
                                                          evaluations and/or ongoing monitoring to
                                                          validate the operational effectiveness of
User access. Policies and procedures should               information security policies and internal
be in place to limit system access and eliminate          controls, including management reviews,
non-active users or those who violate policies.           internal audits and external examinations.

Employee evaluations and training.                        Data processing and transactions. Policies
Background checks should be conducted                     and controls should ensure that processing
before hiring. Personnel responsible for the              and data transmissions are complete and
design, development, implementation and                   accurate through reconciliations, edit checks,
operation of the system should be reviewed                system entry configurations, dual controls,
                                                          job monitoring and management review.

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                     Ncontracts     5
While a vendor might not be able
                                                          to fully disclose the details of its
                                                          business continuity plan for security
                                                          reasons, there are still plenty of ways
                                                          to assess a vendor’s preparedness
                                                          and potential risk.

                                                          It’s all a part of managing transaction risk, or
                                                          the risk that a third party will fail to provide
                                                          products and services as expected, adversely
                                                          impacting the institution or its customers.
                                                          Transaction risk differs from operational
Processing and data transmissions
                                                          risk in that it focuses on contingency planning,
transactions should be validated through
                                                          but the two share many overlapping areas.
authentication protocols with inputs
authorized through implementation
                                                          Mitigating transaction risk isn’t just good
reviews and management approvals. Timely
                                                          business. It’s a requirement of the FFIEC IT
job scheduling and transactions based upon
                                                          Examination Handbook Business Continuity
predetermined schedules is necessary along
                                                          Management Services and other regulatory
with procedures and protocols to ensure that
                                                          guidance. That why an FI must evaluate
exceptions and issues are identified, escalated,
                                                          a vendor’s business resilience controls to
tracked and addressed.
                                                          minimize financial loss and mitigate
                                                          adverse effects of service interruptions. It
Subcontractor oversight. Due diligence,
                                                          must be certain that vendors will be able to
monitoring and oversight of critical third-
                                                          meet service level agreements and recovery
party vendors is necessary.
                                                          time and point objectives (RTOs).
                                                          This is best accomplished by addressing the
2. TRANSACTION RISK                                       following areas with vendors:

Sometimes networks go down. Yet no                        Planning. While a vendor might not be able
matter whether an outage or other business                to fully disclose the details of its business
problem is caused by a natural disaster,                  continuity plan for security reasons, there
cyberattack, equipment failure, fraud or                  are still plenty of ways to assess a vendor’s
other event, vendors must have plans and                  preparedness and potential risk. The vendor
procedures in place to ensure service and                 should review and test its business continuity
product delivery is quickly restored.                     planning/disaster response plan annually and

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                      Ncontracts      6
share the results with clients. That includes             customer information systems and data. These
the date of the last disaster recovery test               preventative controls include secure coding,
of the production environment. Vendors                    firewalls, a demilitarized zone, secure network
should share the results, letting FIs know                configurations, network segmentation,
whether testing objectives were met and                   secure VPN’s and logging. There must also be
communicated to the board of directors.                   detective controls such as monitoring,
                                                          intrusion detection systems and anti-malware
Threat management. Vendors should conduct                 software. Corrective measures such as patch
a periodic business impact analysis to identify           management and risk and vulnerability
and assess the likelihood and impact of threats           remediation protocols should be defined and
that could interfere with their ability to meet           implemented. Vulnerability and/or penetration
service level Vendor Risk Countdown: The Top              scans must be performed periodically.
10 Risks Posed by Third-Party Vendors to Your
Financial Institution Ncontracts 4 agreements.            Incident response. Another key element is
They should have clearly defined recovery                 anincident response and management policy
time and point objectives (RTOs) which may                or plan, which outlines how the vendor would
include mirrored backups and dual processing              manage and address a confidential data
sites. Roles and responsibilities for disaster            security breach or cyber-security incident.
response (such as initial assessment, crisis              That includes a protocol to notify affected
management and communications) should be                  clients.
assigned.Pandemic planning is a must.
                                                          Subcontractors. Reliance on third-party
Recovery. Recovery capabilities should be                 providers, key suppliers, or business partners
assessed and monitored commensurate with                  may expose FIs to points of failure that may
the criticality of services provided. There               prevent resumption of operations in a timely
should be redundant, backup or alternate                  manner. Vendors should conduct their own
power sources in place (such as generators).              risk assessments of all major risks, including
Alternate facilities for resuming critical                credit, liquidity, transaction and reputation
services should be identified and critical data           risk, among others.
should be regularly backed up, mirrored and/
or replicated.                                            3. COMPLIANCE RISK
                                                          Financial institutions must follow laws,
Data protection. Data should be meticulously
                                                          regulations and rules, and should require
protected. There should be physical security
                                                          their vendors to comply as well. Compliance
controls and protocols to prevent unauthorized
                                                          risk is the risk that a third-party vendor will
access to facilities or areas housing confidential
                                                          violate one of these orders or fail to follow

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                       Ncontracts        7
the institution’s own internal policies. This can          • When customer and employee data is
have reputational, financial and regulatory                  transmitted to foreign countries;
consequences for the financial institution.                • Conflicts of interest between a bank and a
                                                             third party are not appropriately managed;
According to the OCC’s Third-Party
                                                           • Transactions are not adequately monitored
Relationships Risk Management Guidance,
                                                             for compliance with all necessary laws and
compliance risk commonly occurs when:
                                                             regulations; and
• Products, services, or systems associated
                                                           • A bank or its third parties have not
  with third-party relationships are not
                                                             implemented appropriate controls to
  properly reviewed for compliance;
                                                             protect consumer privacy and customer
• The third party’s operations are not                       and bank records.
  consistent with laws, regulations, ethical
  standards, or thebank’s policies and
  procedures;                                              It’s not enough for a company to say
• A third party implements or manages a                    it doesn’t disclose breaches to third
  product or service in a manner that is unfair,           parties unless they are affected—
  deceptive, or abusive to the recipient of the            agreements must spell out that clients
  product or service;                                      will be notified.

• A bank licenses or uses technology from
  a third party that violates a third party’s             Once again, compliance risk abuts several
  intellectual property rights;                           other types of risk including operational,
• The third party does not adequately                     reputation, country, transaction and cyber
  monitor and report transactions for                     risk. To assess compliance risk FIs should
  suspicious activities to the bank under
  the Bank Secrecy Act or Office of Foreign
  Asset Control;
• A bank’s oversight program does not
  include appropriate audit and control
  features, particularly when the third party
  is implementing new bank activities or
  expanding existing ones;
• When activities are further subcontracted;
• When activities are conducted in foreign
  countries;

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                     Ncontracts     8
determine whether vendors are aware of                    be secure disposal measures to properly
both new and existing regulations and                     dispose of unneeded consumer information.
have policies and procedures in place to                  Information security controls/practices.
implement them. Audit and control features                Vendors should encrypt all highly confidential
should demonstrate their compliance. This                 information and authentication credentials,
include logs and best practices for monitoring            use VPN, appropriately segregate duties and
transactions for suspicious activity and                  require acknowledgement and acceptance
compliance with others laws and regulations.              of confidentiality/non-disclosure agreements
                                                          before permitting access to confidential
Data privacy is of particular interest to                 data or systems.
regulators making it important to ensure
compliance with laws, regulations and best                Security for personnel who will have access
practices from OFAC, the Gramm-Leach-Bliley               toconfidential consumer information. This
Act, the Sarbanes-Oxley Act, the Fair Credit              includes pre-employment background
Reporting Act and the Health Insurance                    investigations and initial and ongoing
Portability and Accountability Act. Vendor                information security training.
controls should be designed with these
specifically in mind.                                     Physical security protocols and controls to
                                                          safeguard facilities containing confidential
FIs can find information about these controls             data. All desktop-computing devices should
in vendor documents such as annual due                    be physically secured with locking devices.
diligence questionnaires, SSAE 16 reports and             There should be a visitor access policy with
independent third-party reviews during annual             24/7 security personnel on site, closed-circuit
SOC 2 audits.                                             surveillance throughout the facility and
                                                          card-key access control with permissions
Important areas to review include:                        assigned based upon job responsibility.
Privacy policy. Vendors need an information
privacy policy and an information security                Security protocols and controls to safeguard
program that’s reviewed and/or updated                    electronic data. All desktop computers should
periodically. It should include a risk                    require an individual identification and
assessment process to identify reasonably                 authentication at log on with formal policies
foreseeable internal and external threats                 to define password parameters. Access should
that could result in unauthorized disclosure,             be restricted based on job responsibilities and
misuse, alteration or destruction of information          access rights should be reviewed periodically.
and assets. These threats must be evaluated,              There should also be termination protocols
managed and monitored. There should also                  and checklists.

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                      Ncontracts    9
Network security protocols and controls to                                 That’s why it’s important to focus on credit
prevent and/or detect unauthorized access                                  risk, or the strength and ability of a company
and cyber-security incidents. Look for anti-                               to manage debt and stay in business to
virus software on desktops, servers and host,                              ensure continued operations. The FDIC says
with patches obtained from secure sites.                                   that FIs should evaluate third-party vendor’s
Anti-malware software should be installed on                               financial condition at least annually2 and that
critical servers and on end-point devices, with                            the review “should be as comprehensive as
signatures updated nightly. There shouldbe a                               the credit risk analysis performed on the
defense in-depth program, including intrusion                              institution’s borrowing relationships.”
detection/intrusion prevention systems and
semi-annual threat and vulnerability testing                               The good news for bankers and credit
and attack and penetration tests. Centralized                              union professionals is that the board and
monitoring via security incident and event                                 management should be very experienced
management (SIEM) and perimeter firewall                                   in evaluating businesses, audited financial
systems is necessary. So is an incident                                    statements and publicly available documents.
reporting and response program to address
and manage confidential data security
                                                                           It doesn’t matter how compliant,
breaches and/or cybersecurity incidents. That
                                                                           effective or technologically sound a
includes client notification. It’s not enough for
                                                                           vendor’s product or service is if the
a company to say it doesn’t disclose breaches
                                                                           company won’t be in business very long.
to third parties unless they are affected—
agreements must spell out that clients will
be notified.                                                               Areas to look at include:
                                                                           Financial condition. A company’s liquidity
4. CREDIT RISK                                                             and leverage figures reveal the strength of its
                                                                           condition. Assess the viability of an operation
It doesn’t matter how compliant, effective or
                                                                           by noting cash, debt, debt to equity, interest
technologically sound a vendor’s product or
                                                                           coverage ratio and auditor’s opinions of
service is if the company won’t be in business
                                                                           ongoing concerns.
very long. An FI that partners with a financially
unsound vendor may find itself suddenly cut
                                                                           Financial performance. Reviewing profitability
off from a critical product or service if that
                                                                           and cash flow are essential. That includes
firm goes under.
                                                                           revenue, gross margin, operating income or
                                                                           loss, operating margin percent, net income

2 Financial Institution Letter. Guidance for Managing Third-Party Risk. June 6, 2008. https://www.fdic.gov/news/news/financial/2008/fil08044a.html.
3 Risk Management Principles for Third-Party Relationships. A Telephone Seminar for Community Banks. Handout. August 2002.
  https://www.occ.gov/static/past-conferences-and-seminars/vmts-final-handouts.pdf.

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                                                      Ncontracts          10
or loss, net margin percent, EBITDA, EBITDA               or doesn’t provide the expected return on
margin percent, operating cash flow and free              investment, according to the OCC.3
cash flow.
                                                          Strategic risk impacts the viability of a
Litigation. Claims for punitive or exemplary              business in the same way credit risk does.
damages from pending or threatened                        But instead of focusing simply on numbers,
litigation can wreak havoc on the bottom line.            it involves reviewing how decisions are
Be aware of any legal action on the horizon,              made and implemented and how a company
the potential fallout and what, if any, plans the         responds to changing market conditions.
company has to cover the damages.                         A company that isn’t managed well may
                                                          not stay in business long or provide quality
Acquisitions. Acquisitions can expand a                   products and services.
company’s offerings, spread its resources
too thin or rapidly increase the debt load.
Look into pending acquisitions or sales and
                                                          Strategic risk is the possibility that
how that may impact the company’s financial
                                                          a company doesn’t make decisions
condition as well as other unfunded liabilities.
                                                          that support its long-term goals.

                                                          The key areas to look at when assessing
                                                          strategic risk include:
                                                          Background. It begins with basic background
                                                          that includes the age of a company and the
                                                          size of its market. Large nationwide providers
                                                          tend to be stronger than smaller competitors.
                                                          And the larger the client base, the more likely
                                                          the company is to be stable.

                                                          Leadership. Determine who is responsible
5. STRATEGIC RISK                                         forachieving corporate objectives, oversight
                                                          of operating functions and compliance with
Strategic risk is the possibility that a company
                                                          applicable regulatory requirements. You want
doesn’t make decisions that support its
                                                          to see that senior management and the board
long-term goals. This can happen when
                                                          of directors are meeting to ensure business
risks aren’t properly assessed; not enough
                                                          strategies are aligned with operations across
thought and due diligence are put into new
                                                          the organization. At larger companies,
products, business lines or activities; or when
                                                          executive management committees may
the company undertakes an action that’s
                                                          provide oversight.
not consistent with the company’s goals

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                      Ncontracts    11
Operational controls and audits. It’s not                                    and whether or not it outsources to foreign/
enough to have operational controls. They                                    offshore service providers or subcontractors.
must be monitored through management
reviews and internal and external audits.                                    Notice that transaction, operational, country
Annual independent audits should demonstrate                                 and cyber risks are all included when
the suitability and effectiveness of internal                                assessing strategic risk. Any method used
controls. Lines of authority and responsibility                              to conduct a strategic risk assessment
should be established. Managers should                                       should leverage these overlaps to maximize
monitor reports and controls to provide                                      efficiency.
reasonable assurances that activities are
performed in a secure, complete, accurate                                    6. REPUTATION RISK
and timely manner, and exceptions are
identified, tracked, recorded and resolved.                                  Reputation is hard to earn and easy to lose.
                                                                             Whether its lawsuits, fraud or data breaches,
Vendor management. FIs need vendor                                           consumers notice bad headlines and take their
management programs and so do vendors.                                       business elsewhere.
The risk assessment process/program should
identify and mitigate risks that might affect a                              Consider the headache $18.4 billion-asset First
vendor’s continued ability to provide reliable                               National Bank of Omaha faced in 2016 when
services to its users. This includes third-party                             it came out that its credit card add-on vendor
oversight and monitoring, and identification                                 charged customers for credit monitoring
and resolution of information security-related                               services they didn’t receive. Neither customers
risks.                                                                       nor regulators differentiated between the
                                                                             bank and its vendor when assigning blame for
Business continuity. There should be protocols                               ripping off customers. Not only did the bank
to mitigate or prevent business interruptions,                               pay millions in penalties to the CFPB and OCC,
and to respond, recover and resume critical                                  the bad publicity of newspaper headlines
business functions after an unplanned                                        created costs that are not easily calculated
business disruption.                                                         from loss of goodwill.

Outsourcing and offshoring. The vendor                                       Vendor mistakes like this can hurt a bank’s
should know whether or not all operations                                    reputation, the FDIC4 and OCC5 say, when
and personnel are all located within the U.S.                                they cause:

4 Financial Institution Letter. Guidance for Managing Third-Party Risk. June 6, 2008.
  https://www.fdic.gov/news/news/financial/2008/fil08044a.html.
5 OCC Bulletin 2013-29. Risk Management Guidance. Subject: Third-Party Relationships. Appendix A: Risks Associated with Third-Party Relationships
  https://www.occ.gov/news-issuances/bulletins/2013/bulletin-2013-29.html.

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                                                    Ncontracts          12
• Dissatisfied customers/poor service                    FIs “Review the third party’s Web sites and
 • Frequent or prolonged service disruptions              other marketing materials to ensure that
                                                          statements and assertions are in-line with
 • Interactions not consistent with institution
                                                          the bank’s expectations and do not overstate
   policies
                                                          or misrepresent activities and capabilities.
 • Inappropriate sales recommendations                    Determine whether and how the third party
 • Security breaches resulting in the                     plans to use the bank’s name and reputation
   disclosure of customer information                     in marketing efforts.”6

 • Violations of consumer law and regulation
                                                          These materials help an FI identify potential
 • Negative publicity involving the third party           reputation risks and find out what, if any
   Vendor Risk                                            steps, the vendor has taken to remediate past
                                                          problems. Then an FI can decide if the risk
While there is no way to guarantee that                   can be mitigated with careful follow up and
vendor actions won’t damage an institution’s              clarifying protocols to ensure oversight with
reputation, thorough due diligence can help               service level agreements or if that vendor just
an institution gauge the risk a particular                isn’t worth the risk.
vendor poses. It just takes some digging.

                                                          7. CYBER RISK
Go beyond the documents the vendor
gives you and seek out publicly available                 In a world of increasingly sophisticated cyber
information. Determine if the vendor is                   threats, it’s essential that vendors are able to
registered and in good standing with                      prevent, detect and respond to cyberattacks.
the proper authorities, including the state               Cyber risk is about having the tools, policies
where it operates. Find out how many and                  and procedures to identify and mitigate
what types of complaints it has filed against             internal and external cyber threats and
it with the CFPB website, and keep in mind                vulnerabilities.
that these claims are unsubstantiated.
See how the business ranks with the Better                Some people might argue that cyber risk is
Business Bureau and conduct a search of                   already covered by operational, transaction,
news stories to learn of any past problems.               strategic and compliance risk, and it may be

Other good reference checks include the
                                                          Cyber risk is about having the tools,
Federal Trade Commission, state attorneys
                                                          policies and procedures to identify and
general offices, state consumer affairs
                                                          mitigate internal and external cyber
offices and the U.S. Securities and Exchange
                                                          threats and vulnerabilities.
Commission. The OCC also recommends

6 Ibid.

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                       Ncontracts    13
covered based on the depth of your internal
review. But the growing number of hacks,                  While there is no way to guarantee
attacks and other threats make it clear more              that vendor actions won’t damage an
effort is needed.                                         institution’s reputation, thorough due
                                                          diligence can help an institution gauge
In 2015, the FFIEC released its Cybersecurity             the risk a particular vendor poses.
Assessment Tool to help banks and credit
unions evaluate potential cyber risks and                 Here are the areas where FIs should be
understand inherent risk and cyber maturity.              focusing their cyber due diligence:
                                                          Identify high-risk activities. A vendor poses
                                                          agreater cyber risk and requires increased
                                                          management oversight when it:
                                                           • Houses confidential data in a cloud-based
                                                             system
                                                           • Houses or outsources confidential data
                                                             offshore
                                                           • Outsources sensitive activities and/or
                                                             a number of critical operations
                                                           • Uses web-based services to conduct
                                                             business transactions with customers
                                                           • Permits access of confidential data to
                                                             third-party providers

Rather than lump cyber risk in with other
                                                          Controls from the top. Just like an FI, third-
categories, it’s important for banks and credit
                                                          party vendors should have controls and
unions to directly address this critical risk
                                                          protocols to identify cyber risks. The vendor’s
with vendors, using the FFIEC Cybersecurity
                                                          board or one of its committees should
Assessment Tool as a guide. Chances are
                                                          directly review and approve its cyber program
most institutions are already engaging in
                                                          Regular monitoring of the program is a must,
many of the activities recommended by the
                                                          identifying threats and vulnerabilities with a
assessment in different departments and
                                                          periodic risk assessment that estimates the
during different risk assessments. The FFIEC’s
                                                          likelihood and impact of cyber risks.
exercise will ensure information from these
different silos will come together and ensure
                                                          Protect systems. All system activity and
vendors are prepared.
                                                          events should be logged and monitored, and
                                                          physical access controls should be monitored

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                      Ncontracts   14
to detect suspicious activity. E-mail should be           Data security. There should be protocols
filtered for common cyber threats. Vendors’               andmulti-factor authentication during data
vendors with access to data should meet                   transmissions and storage and protocols for
defined data protection standards.                        securely destroying data.

Incident response. Third-party vendors must               Cloud risk. Vendors that rely on a cloud-based
have an incidence response policy that clearly            system require additional scrutiny. (See Cloud
defines a protocol for informing affected                 Risk below.) With this information, FIs can
stakeholders, regulators and law enforcement              identify cyber risks, deciding if the level of risk
officials of a cyber incident where confidential          presented can be mitigated through protocols
data was likely compromised.                              and service level agreements or if the risk is
                                                          just too great.
Internal controls. Vendors must implement
controls to prevent or mitigate the severity              8. CLOUD RISK
of a cyberattack. Network security controls
                                                          Perhaps there’s no buzz word more confusing
such as anti-malware, firewalls, intrusion
                                                          to bankers and credit union executives than
prevention and detection software, and
                                                          “the cloud.” It evokes an ethereal image of
segmented networks should be in place to
                                                          data floating safely and serenely overhead,
reduce the likelihood of unauthorized users,
                                                          able to materialize on screen with the press
devices, connections or software. There
                                                          of a button.
should be configuration, network and system
change control processes and protocols.
                                                          But the cloud is a place on earth. Actually,
Protocols for anti-malware software updates/
                                                          it may be many places on earth.The cloud
patch management must be defined and
                                                          means someone else’s computer. It is typically
implemented. Periodic vulnerability scans and/
                                                          a bunch of data centers. Using the cloud is
or penetration testing should be performed,
                                                          buying space on someone else’s infrastructure
and the vendor should have cyber insurance
                                                          (or data center) to store and/or process data
coverage.
                                                          which you can then access via the Internet.
                                                          Sometimes these computers are used
Human resources. Access controls should be
                                                          exclusively by one institution, known as a
role-based and granted based upon job
                                                          private cloud. Other times, several clients use
function. Personnel should be screened before
                                                          the same computers at a data center, known
hiring and employees should undergo data
                                                          as a shared cloud.
safety training.

                                                          The cloud faces all the same risks as any other
                                                          third-party IT vendor, which include cyber
                                                          risk, reputation risk, operational risk, etc. After

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                        Ncontracts     15
all, it’s a physical location with all the same                          Cyber. There should be clearly defined
inside and outside threats any organization                              procedures for responding to and reporting
faces. But’s is growing use and importance                               security incidents and notifying customers
is undeniable—and it’s starting to attract                               and regulators of any breaches.
regulator attention.

The FFIEC highlighted the importance of
risk management and cloud use in a joint
statement.8 When considering working with
a cloud-based provider, institutions should
ask questions like:
 • What is the type of cloud?
 • Who has access to the data?
 • Where is the data?
 • Is the data backed-up?                                                Data security. Access to cloud data should be
                                                                         defined and restricted. Audit logs should be
 • What is the third-party’s control structure?
                                                                         maintained to monitor and detect changes.
 • Can you perform effective/on-going                                    Data should be encrypted at all times—both
    due-diligence?                                                       at rest and during transmission. When using
 • How difficult is it to disengage?                                     shared clouds, an institution’s data must be
                                                                         segregated from other client data.

Smart FIs are going beyond cyber risk to
                                                                         Country risk. All cloud data should be housed
include cloud risk among their best practices
                                                                         in the United States. If a vendor won’t tell you
for evaluating thirdparty vendors. When
                                                                         where data is stored, find another vendor.
evaluating cloud-based vendors, an institution
should pay mind to existing vendor
management and cyber guidance paying                                     Smart FIs are going beyond cyber
special attention to:                                                    risk to include cloud risk among
                                                                         their best practices for evaluating
Compliance. Ensure the provider is in
                                                                         third-party vendors.
compliance with privacy laws. Specific
responsibilities for data protection must
be defined and communicated, often in
the service level agreement portion of the
contract.

8 FFIEC Joint Statement. Security in a Cloud Computing Environment. 4/30/2020.

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                                     Ncontracts    16
9. CONCENTRATION RISK                                     shouldn’t require much extra effort as long
                                                          as the risk management team is working
When most bankers and credit union                        cohesively. In fact, the OCC includes
executives think of concentration risk, they              concentrations under operational risk.10
think of lending. But concentration has
a different meaning when talking about                    10. COUNTRY RISK
third-party vendors, as the Fed notes in its
Guidance on Managing Outsourcing Risk.                    Speaking of overlapping risks, country risk is
It specifically mentions concentration risk               another example—touching everything from
as something that should be considered                    cloud and reputation risk to transaction and
when seeking out and managing vendors.                    operational risk. Country risk is “an exposure
The two main sources of third-party                       to economic, social, and political conditions
concentration risk are:                                   in a foreign country that could adversely
                                                          affect a vendor’s ability to meet its service
Overreliance on a single vendor. This is a
                                                          level requirements,” according to the FFIEC’s
classic case of putting all your eggs in one
                                                          Appendix C: Foreign-Based Third-Party
basket. If an institution relies heavily on
                                                          Service Providers.11 In extreme cases, country
a single provider for many products and
                                                          risk might result in loss data loss. It’s not
services that institution might be unable to
                                                          always obvious when a company poses
conduct business if something catastrophic
                                                          country risk. For banks and credit unions the
happens to that vendor. That’s not to say
                                                          threat is most pronounced when it comes to
an FI can’t choose to outsource many major
                                                          data centers and the cloud, but can affect any
functions to a single vendor, but it just better
                                                          overseas operation. Many data centers store
have an airtight backup plan in place.
                                                          their data on the other side of the world in
                                                          foreign countries to ensure their systems are
Geographic concentration. If both an
                                                          always running, which is the extreme opposite
institution and its third-party vendors and
                                                          of geographic concentration.
subcontractors are in the same region,
it’s possible the same event could impact
                                                          While this sounds good on the surface, it’s
everyone’s operations since they all rely on
                                                          a challenge for FIs that must then answer
the same power and telecommunications
                                                          questions about the country where their data
infrastructure.
                                                          is stored. Topics to address include: political

The good news is that because concentration
risk overlaps with other areas including                  In extreme cases, country risk might
operational, credit and transactional risk, due           result in loss data loss.
diligence and supporting documentation

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                      Ncontracts     17
and economic stability; infrastructure such as                             CONCLUSION
the power grid; and local regulatory and                                   There’s no shortage of risks when it comes to
legal oversight such as background checks                                  outsourcing to third-party service providers,
and authorization.                                                         but it still frequently makes sense to outsource
                                                                           critical operations. The key is to carefully
The FDIC warns, “Managing country risk                                     assess vendors and, when it comes to the
requires the ability to gather and assess                                  most critical vendors, choose the ones that
information regarding a foreign government’s                               are most effective in helping FIs mitigate
policies, including those addressing                                       those risks.
information access, as well as local political,
social, economic, and legal conditions.”12                                 The overlapping nature of these risks makes
The Fed encourages ongoing monitoring of                                   itessential for FIs to have a comprehensive,
these risks.13 Managing these risks “should                                top-down approach to enterprise risk
include the establishment of contingency,                                  management and vendor management. By
service continuity, and exit strategies in the                             taking a broad view of risk management,
event of unexpected disruptions in service,”                               FIs can leverage the risk assessment and
says the FFIEC. The OCC also addresses                                     mitigation work performed by various
the topic.14                                                               departments throughout the institution,
                                                                           streamlining the process to make it more
                                                                           effective and more efficient.

                                                                           Ncontracts provides a variety of tools to
                                                                           help FIs face this challenge in a methodical,
                                                                           organized way.

                                                                           Nvendor is a secure, feature-rich, online
                                                                           vendor and contract management solution
                                                                           that enables financial institutions to achieve
                                                                           and maintain regulatory compliance in their

10 OCC Bulletin 2013-29. Risk Management Guidance. Subject: Third-Party Relationships. Appendix A:
   Risks Associated with Third-Party Relationships https://www.occ.gov/news-issuances/bulletins/2013/bulletin-2013-29.html.
11 FFIEC IT Examination HandBook InfoBase. Appendix C: Foreign-Based Third-Party Service Providers.
   http://ithandbook.ffiec.gov/it-booklets/outsourcing-technology-services/appendix-c-foreign-based-third-party-service-providers.aspx .
12 FDIC Compliance Examination Manual. Unfair and Deceptive Practices–Third Party Risk.
   https://www.fdic.gov/regulations/compliance/manual/7/VII-4.1.pdf.
13 SR-02-5. Federal Reserve Interagency Guidance on Country Risk Management. March 8, 2002.
   https://www.federalreserve.gov/boarddocs/srletters/2002/sr0205.htm.
14 OCC Bulletin 2002-16. Risk Management Guidance. Bank Use of Foreign-Based Third-Party Service Providers. May 15, 2002.
   https://www.occ.gov/news-issuances/bulletins/2002/bulletin-2002-16.html.

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                                                      Ncontracts        18
third-party vendor relationships. Features                silos. Careful risk assessment and monitoring
include assistance with vendor policies                   from pre-contract due diligence and
and procedures, vendor classification, vendor             throughout the length of the relationship is
due diligence, risk assessment and vendor                 critical for proper vendor management.
monitoring.
                                                          The NcontractsManager platform helps
Ncyber guides institutions through                        break down the silos with a secure, web-
the FFIEC’s Cybersecurity Assessment                      based repository for all your contracts. With
Tool, helping analyze inherent risk and                   our expertise, you can reduce risk exposure
cybersecurity maturity levels.                            and develop contracts that save money and
                                                          increase profits for your organization.
Ncontinuity is a flexible, scalable, and secure
online business continuity planning solution.             Nverify gives your team the tools and support
Its interactive dashboard, tools and support              to conduct automated, integrated auditing
strengthen business continuity needs                      capabilities that not only ensure compliance,
throughout your organization and in your                  but also identify opportunities for internal
third-party vendor relationships.                         process improvement that can create cost
                                                          savings for years to come. Nverify is easy to
Nrisk is a secure, online risk management                 implement — in as little as two hours, your
solution that enables continuous                          team can have access to all the data they
measurement of financial and non-financial                need to generate audits that enable positive
impacts by location, department, business                 exam results.
process, application or line of business.
                                                          Ncommunity integrates with other software
It simplifies the risk assessment process using
                                                          in our lending compliance suite, for holistic
natural language navigators and wizards
                                                          lending compliance that enables your
that guide users step-by-step through the
                                                          financial institution or financial services
process of evaluating risk and related financial
                                                          company to experience the upside of risk. Our
exposures—leveraging the hard work your
                                                          platform is designed, built, and supported by
institution has already done.
                                                          professionals with extensive experience in
Regardless of approach, FIs need to be
                                                          financial institutions and mortgage companies,
assessing each of these vendor risks to
                                                          empowering lenders to navigate the lending
determine the level risk and amount oversight
                                                          ecosystem, reduce compliance and lending risk,
and monitoring a specific vendor requires. As
                                                          and accelerate healthy business growth.
regulators continue to expand and investigate
categories of risk, it’s no longer efficient or
effective to conduct these risk assessments in

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                     Ncontracts    19
Nfindings lets your organization access and               Ntransmittal integrates with other software
manage findings. Our centralized platform                 in our lending compliance suite, for holistic
makes it easy to access and manage findings               lending compliance that enables your financial
from internal, external, and regulatory audits            institution or financial services company to
in real time, so you have what you need, right            experience the upside of risk. Learn more
when you need it.                                         about the comprehensive compliance
                                                          solutions we offer banks, mortgage companies,
With extensive reporting capabilities, your
                                                          and credit unions.
team can identify and evaluate exam and
audit findings to take the appropriate steps
for exam readiness and overall compliance.

Your team can assign tasks to each finding,
direct the best course of action, and monitor
the work being done. Automated reminders
and notifications help to expedite and
accelerate workflow.

About Ncontracts

Ncontracts provides integrated risk management and compliance software to a rapidly
expanding customer base of nearly 1,800 financial institutions located in all 50 states and US
territories. The company’s powerful combination of software and services enables financial
institutions to achieve their risk management and compliance goals with an integrated, user-
friendly cloud-based solution suite that encompasses vendor risk, organizational risk, audit risk,
and compliance risk management. The company was recently named to the Inc. 5000 fastest-
growing private companies in America for the second consecutive year.

For more information visit www.ncontracts.com or follow the company on LinkedIn and Twitter.

Top 10 Risks Third-Party Vendors Pose to Your Financial Institution                    Ncontracts   20
You can also read