Supply Chain Council of European Union | Scceu.org
News

SolarWinds Vendor Supply Chain Attack: A Timely Reason To Review Procedures For Risk Assessments And Vendor Contracts – Privacy


To print this article, all you need is to be registered or login on Mondaq.com.

As reported last week, a state-sponsored hacker may have
breached multiple U.S. government networks through a widely-used
software product offered by SolarWinds. The compromised product,
known as Orion, helps organizations manage their networks, servers,
and networked devices. The hacker concealed malware inside a
software update that, when installed, allowed the hacker to perform
reconnaissance, elevate user privileges, move laterally into other
environments and compromise the organization’s data.

Orion is not only used by government agencies, but is widely
used in both the public and private sectors. According to 
another blog
, victims of the attack include “government,
consulting, technology, telecom and extractive entities in North
America, Europe, Asia and the Middle East.” SolarWinds’s
recent SEC filings estimate that about 18,000 of its customers may
have downloaded the malware-laden software updates for Orion. To
learn more information about this attack and evolving cybersecurity
threats, please visit the 
NSA’s Cybersecurity Advisories & Technical Guidance
.
For a list of steps an organization might take to assess the impact
of this issue on its specific situation, 
see this blog post
.

Whether or not you are one of the impacted customers, the
SolarWinds attack is a reminder of the importance of conducting
incident response and risk assessments under privilege whenever
possible, the importance of performing due diligence before
engaging vendors, and why businesses should implement procedures to
minimize information disclosed to or accessed by vendors. The
attack is also highlights the care that needs to be taken by both
customers and vendors when negotiating data security provisions in
technology contracts.

Conducting Privileged Dual-Purpose Risk
Assessments

The aftermath of the SolarWinds cybersecurity attack has left
organizations scrambling to determine whether their systems have
been breached and the scope of any such breach. Unfortunately, the
documents created by an organization as it evaluates its security
posture are exactly the types of documents that a plaintiff’s
counsel or regulator would like to get their hands on if there is
an investigation or litigation.

To mitigate this concern, risk assessments can be structured in
a way to serve both a business purpose (assessing the state of
security) as well as a legal purpose (assisting counsel evaluate
risks related to the state of security), allowing certain
protections to limit discoverability, including privilege, work
product, and protections under FRCP 26(b)(4)(D). Assessments that
serve both legal and business purposes are known as
“dual-purpose” risk assessments.

Under developing case law, there are a number of ways to conduct
a dual-purpose risk assessment. While courts will consider the
totality of the evidence when deciding whether materials generated
during the course of a risk assessment are privileged or
discoverable, recent cases have emphasized the following
factors.

  • Involvement of Counsel: Counsel should be actively
    – not passively – involved in every step of the
    assessment, from the initial scoping of the assessment (discussed
    below), to fact-finding, retaining experts, and drafting any
    reports. In other words, as recent cases make clear, it is not
    enough to simply state that the assessment was performed at
    counsel’s direction. Given that courts look at the totality of
    the circumstances when deciding whether or not to maintain
    privilege over risk assessment materials, the greater the evidence
    that counsel was actively involved, the easier it will be to
    distinguish the assessment and investigation from other
    ordinary-course-of-business assessments or investigations that
    would not necessarily involve counsel.

  • Scope of the Assessment: The scope of the
    assessment, and the process by which the scope is defined, should
    indicate that the assessment is driven by a legal purpose. This
    means that the scope should be different from those of assessments
    conducted in the ordinary course of business, and should clearly
    and expressly convey that the assessment is conducted for a legal
    purpose. Toward this end, counsel should have at least some direct
    involvement in defining the scope, and, as discussed above, the
    greater the involvement, the more evidence to support privilege
    protection. While the scope will clearly convey a legal purpose,
    any stated business purpose for the assessment should be, as one
    court explained, “profoundly interconnected” with the
    legal purpose.

  • Distribution of Materials: While materials
    generated during the course of dual-purpose risk assessments can be
    used for certain business purposes without destroying privilege
    protections, some courts have found that the extent to which these
    materials are distributed is probative the purposes for which the
    work product was initially produced. Wide distribution of these
    materials may suggest they were created further to a business, as
    opposed to a legal, purpose. As discussed above with respect to
    scoping the assessment, permissible business uses generally relate
    to areas where the business and legal purposes interconnect.

In the more extreme cases an organization may want to consider a
“Dual Track” approach where separate privileged and
non-privileged investigations proceed in parallel.  As the
SolarWinds cybersecurity attack is likely to trigger organizations
to investigate their networks for vulnerabilities and data theft,
it is important to consider the downstream consequences should the
assessment uncover related (or unrelated) vulnerabilities and/or
intrusions. Conducting a risk assessment under privilege may help
companies limit the discoverability of what they learn.

Mitigating Risk Using Diligence, Contractual Obligations and
Data Minimization

The SolarWinds cybersecurity attack serves as a cautionary tale
for all companies and vendors entering into outsourcing software
agreements in their business. No one can predict when a malicious
cyberattack will occur, especially one with the scale and
sophistication of a nation-state attack like this one, but
companies and vendors can take steps now to mitigate their
risks.

  • Diligence: Companies and vendors should conduct thorough
    diligence (either directly or through a third-party consultant)
    prior to finalizing material software or IT vendor agreement.
    Outsourced software solutions provide cost-savings and increased
    efficiencies, but moving operations off of company systems or
    introducing third-party software on to company’s networks can
    introduce a fracture point which cyber criminals may target.
    Companies and vendors should be aware of each other’s data
    security practices, history of cybersecurity incidents, and any
    security audits conducted. As the SolarWinds cybersecurity attack
    demonstrates, even sophisticated software companies may face
    cybersecurity attacks, so after conducting cybersecurity due
    diligence, companies and vendors must be prepared to respond and
    cooperate if and when a cybersecurity attack occurs.
     Additionally, companies and vendors should review and agree
    on cybersecurity insurance policies as part of the due diligence
    process.

  • Contractual Obligations: With cybersecurity attacks, one
    of the first things companies and vendors do is review their
    agreements and determine what steps the parties are required to
    take and who is responsible for the costs. As such, when
    negotiating software agreements, companies and vendors should pay
    careful attention to data breach notification provisions which may
    require notification of suspected security incidents sooner than as
    required by law. Such provisions may also require the parties to
    engage nationally-renowned forensics firms and to promptly respond
    to the security incidents or breach. Contractually stipulating each
    parties’ notification obligations in the event of a breach may
    help clarify the parties’ responsibilities and timing with
    respect to notifications to government regulators and the clients
    of the company.

  • Data Minimization: Lastly, the SolarWinds cybersecurity
    attack demonstrates that even with detailed diligence, vendors may
    be targeted by a breach. Contractual obligations may limit the
    costs associated with a breach and downstream legal obligations,
    but they cannot retrieve company or customer data once it has
    already fallen into the hands of cyber criminals. The only way to
    limit the amount of data exposed through cybersecurity attacks is
    to limit the amount and type of data shared between companies and
    vendors. This may not always be possible, but the companies and
    vendors can work together to implement and maintain data
    minimization procedures which require employees and any other
    individuals accessing the software solution minimize the amount and
    type of information provided or generated on such solution.

The SolarWinds cybersecurity attack serves as yet another
reminder that organizations must implement technical, physical and
administrative safeguards to reduce the risk of suffering a breach,
either directly or by a vendor, and to plan ahead in the event that
a breach does occur. By assessing organizational risk and taking
proactive steps when drafting software agreements, companies and
vendors can be better prepared should they become the next
target.


SolarWinds Vendor Supply Chain Attack: A Timely Reason to Review
Procedures for Risk Assessments and Vendor Contracts

The content of this article is intended to provide a general
guide to the subject matter. Specialist advice should be sought
about your specific circumstances.

POPULAR ARTICLES ON: Privacy from United States

How The CPRA Law Overhauls And Updates The CCPA

Klein Moynihan Turco LLP

As readers know, on November 3, 2020, California State voters passed Proposition 24, better known as the California Privacy Rights Act (“CPRA”). The CPRA significantly changes California’s …

Related posts

Trade War Tangling Up The Global Supply Chain

scceu

The Denim Supply Chain Came Together to Advance Sustainability in 2019 – Sourcing Journal

scceu

Supply Chain Management Software Market Trends by Growth Demand, Regional Outlook by Business Strategies, Production and Consumption Forecast 2020 to 2024 – The Daily Philadelphian

scceu
`