Operate more efficiently, reduce complexity, improve EBITDA, and much more with the purpose-built platform for MSPs.
Protect and defend what matters most to your clients and stakeholders with ConnectWise's best-in-class cybersecurity and BCDR solutions.
Leverage generative AI and RPA workflows to simplify and streamline the most time-consuming parts of IT.
Join fellow IT pros at ConnectWise industry & customer events!
Check out our online learning platform, designed to help IT service providers get the most out of ConnectWise products and services.
Search our resource center for the latest MSP ebooks, white papers, infographics, webinars and more!
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
8/22/2023 | 11 Minute Read
Topics:
This blog is part three of the multi-part series summarizing “The Ultimate Operations Guide for MSP Cybersecurity.” In this installment, we’ll lay out good cybersecurity governance practices and establish a common starting point for MSPs wanting to build out their cybersecurity offerings. If you’re interested in reading the previous installments of this multi-part series, you can access them below:
Let’s get into the key components of cybersecurity governance for MSPs.
Governance is the set of formal policies, processes, standards, etc., that make up a cybersecurity program and allow an organization to achieve its objectives. It’s common to see standards and policies combined into single documents, but we recommend keeping the documents separate to achieve good end-state maturity. Governance is the stage where approvals and policies come into play, and if you’re starting at ground zero, it’s important to note that setting up and implementing good governance fully typically takes months. But what components constitute good governance for cybersecurity?
The core of a cybersecurity program consists of policies. Policies are high-level descriptions of expected behaviors and goals. Because of this, they don’t change often. For MSPs, items unique to the business model would also appear in these policies. For example, a cybersecurity policy for MSPs could be: “All assets with the client label must require multiple forms of authentication for access.”
The specifics will differ for every organization, both for architectural reasons and risk tolerances. The key point of policies is that they are high-level and don’t usually get into specific technologies—they represent management’s goals for the cybersecurity program. In smaller organizations, the cybersecurity team will write these and send them to management for approval.
Standards answer “what” questions to policy goals. Continuing with the example about client labels shown above, a standard might answer questions such as:
Standards also represent configuration baselines. An organization might decide to configure its Windows devices based on specifications defined in the Center for Internet Cybersecurity benchmarks or the Microsoft cybersecurity baselines. Standards are the place to declare that.
For the configuration example, a higher-level policy would indicate that devices must be configured to use the organization’s configuration baselines. And the standard defines the baseline.
Procedures get into the specifics and define the steps that an employee must take to accomplish something. In the MFA example, a procedure defines how to add new applications to single sign-on (SSO), how to configure employee devices, and at a higher level, how to approve new applications in the first place.
Procedures are dynamic and change the most frequently. And they’re also what most employees use day-to-day.
Requirements differ based on organizational structure, specific regulatory requirements, and technology choices. However, the following are policies every organization should have:
Of course, organizations can have more policies than those listed above, it’s just dependent on their unique needs.
Data classification is critical because of the finite resources MSPs have available. Classifying data and assigning formal responsibilities to individuals serves two purposes. It allows us to prioritize a limited budget on cybersecurity expenditures and identify what is most important. And it defines who is responsible for ensuring that safeguards are implemented.
Formally, the choice of cybersecurity controls comes from an asset’s classification, which you can identify by conducting a crown jewels analysis. An asset is protected by multifactor authentication because all assets with <X> classification level or <Y> label require that level.
Informally, classification often serves to identify special assets or ones that require controls above and beyond the baseline. Regardless of the formality level an MSP uses, the value comes from taking the time to consider the relative priorities of the data and systems.
The person or role responsible for an asset is the data owner. The data owner is not necessarily the person implementing controls, clicking buttons in the interface, or assigning new permissions. However, data owners do approve access requests and policy exceptions. Rather than listing a specific employee as the data owner, we recommend listing a role, such as vice president of operations, to ensure that even in the case of an employee leaving or changing positions, it’s clear who owns the data.
An MSP might decide that their service manager will be the data owner for the RMM system and that the company owner will be the data owner for the PSA software. Those individuals sign off on access modifications, approve changes when needed, and verify that the proper cybersecurity controls are in place, while other individuals in the organization may perform the actual task of making those changes.
Other roles exist in formal classification, like data custodian, data steward, etc. The person who makes the changes would be called the custodian in a formal program. Don’t worry too much about naming the roles—you can save that for a future version of the cybersecurity program.
When defining classification levels, MSPs should think about how granular the controls might get. As a baseline, three levels of classification work as a realistic starting point for many organizations:
For MSPs, it’s important to differentiate between restricted assets and internal with limited permissions. Classification is not the same as permissions. All assets are still subject to the access control policy and principles like least-privilege and role-based access control.
Labels are additional context alongside classification levels. MSPs have a unique cybersecurity concern in that they have access to data and systems that belong to other organizations. Identifying which assets those are versus assets that are internal-only allows writing policies that prioritize the protection of those assets.
It’s important to note that data classification isn’t the same as criticality. Criticality is prioritizing the relative importance of assets in the context of operational dependencies.
There are many roles on a cybersecurity team. So while this is not meant to be a total employee roster, someone on your cybersecurity team does need to be responsible for each of the roles outlined below.
Certifications are one of the important ways MSPs can demonstrate commitment to excellence within the profession. MSPs are encouraged to make certifications a part of company culture, and an excellent way to reward employees who can achieve and demonstrate their professional knowledge on the job.
Some recommended industry certifications include:
ConnectWise also offers members of our Partner Program certifications through ConnectWise University™ and ConnectWise Certify™. Some of these certifications include:
When managing third-party vendors, some important considerations for MSPs include:
Broadly, there’s a cycle when interfacing with third parties and multiple models. While the number and name of steps differ, all third-party lifecycles include:
The common understanding of a third-party risk assessment is that it focuses on cybersecurity risks. For MSPs, there are differences in risk depending on whether the service is internal or part of service delivery. Some of the risk types to consider when evaluating third parties include:
Change management procedures are critical for the fast-paced world of technology solution providers to ensure that implementing any changes to their systems or services is effective and does not disrupt or negatively impact their customers. Some high-level steps that MSPs can follow to establish change management procedures include:
Note that, for smaller organizations, it may suffice to simply meet with the key stakeholders and discuss the steps above before executing any changes.
This blog was meant to serve as high-level summary of good governance processes. For a more detailed understanding of each of these programs and how MSPs should approach cybersecurity governance, read “The Ultimate Operations Guide for MSP Cybersecurity” eBook in its entirety.