Security Requirements

Organizations increasingly rely on third-party vendors for hardware, software, and services.

As a result, establishing and enforcing strong third-party security requirements is essential to ensure the protection of organizational information and systems. Standard documents defining third-party security requirements set out the minimum information security expectations that must be met by all external suppliers.

Third-Party Security Requirements

Third-party security requirement documents establish a consistent approach to managing information security risks associated with external vendors. These documents ensure that:

  • Minimum security requirements are clearly defined and communicated
  • Product and service specifications include necessary security controls
  • Security expectations are aligned with organizational standards

All new hardware, software, or services introduced into the environment must meet or exceed the security requirements expected in the final product. This ensures that no weak link is introduced into the organization’s security posture.

Contractual Enforcement and Risk Management

Security requirements must be formally addressed within contracts and included as part of the scope of work with third-party providers. This ensures accountability and enforceability.

If a proposed product or service does not fully satisfy the required security controls:

  • The associated risk must be carefully evaluated
  • Additional compensating controls should be considered
  • A decision must be made before procurement proceeds

In cases where additional functionality introduces new security risks:

  • The risky functionality must be disabled, or
  • The control structure must be reviewed to determine whether the functionality can be securely utilized

This approach ensures that functionality does not compromise security.

FIPS Minimum Security Requirements

The Federal Information Processing Standards (FIPS) define minimum security requirements across 17 security-related areas. These requirements are designed to protect the confidentiality, integrity, and availability (CIA) of federal information systems and the data they process, store, and transmit.

The 17 security-related areas include:

  1. Access Control
  2. Awareness and Training
  3. Audit and Accountability
  4. Certification, Accreditation, and Security Assessments
  5. Configuration Management
  6. Contingency Planning
  7. Identification and Authentication
  8. Incident Response
  9. Maintenance
  10. Media Protection
  11. Physical and Environmental Protection
  12. Planning
  13. Personnel Security
  14. Risk Assessment
  15. Systems and Services Acquisition
  16. System and Communications Protection
  17. System and Information Integrity

These areas collectively represent a comprehensive and balanced information security program, addressing:

  • Management controls
  • Operational controls
  • Technical controls

Policy and Implementation Requirements

Organizations are required to:

  • Develop formal, documented policies governing minimum security requirements
  • Establish procedures that support these policies
  • Ensure effective implementation and enforcement across all systems and third-party relationships

These measures ensure that security requirements are not only defined but also consistently applied and maintained.

Organizations that rely on third-party vendors must clearly define expectations for service delivery and security. Service Level Requirements (SLRs) and security awareness training are critical components in ensuring that both external services and internal personnel align with the organization’s security objectives.

Service Level Requirements (SLRs)

A Service Level Requirements (SLR) document is a formal statement that defines the service and performance expectations from a vendor’s product or service. When an organization engages a third-party provider, both parties must establish a mutual understanding of:

  • What services will be provided
  • Under which terms the services will be delivered
  • When and how the services will be available

The SLR document captures the client’s expectations from their perspective and defines:

  • Responsibilities of both parties
  • Performance expectations
  • Security requirements
  • Other service-specific conditions

A key principle of SLRs is that every requirement must be expressed as an objective and measurable metric. Ambiguous language should be avoided, as it can lead to misunderstandings.

For example:

  • ❌ _“The vendor must provide excellent uptime”_ (ambiguous and subjective)
  • ✅ _“The vendor must provide continual access to the service, with interruptions not exceeding 60 seconds per defined period”_ (clear and measurable)

Based on the SLRs, the service provider develops a Service Level Agreement (SLA), which formalizes these requirements into a contractual agreement. (SLA details are covered further in Domain 7: Security Operations.)


Security Awareness Training

Security awareness training is essential for establishing a baseline level of security understanding across the organization. It ensures that all personnel:

  • Understand their responsibilities
  • Follow acceptable behaviors
  • Are aware of the consequences of non-compliance

This type of training focuses on fundamental security topics that every employee must understand and plays a critical role in protecting against threats such as social engineering attacks, including phishing.


Security Champions

Organizations should identify and train security champions within teams. A security champion:

  • Acts as the single point of contact for security within a department
  • Serves as a liaison between the security team and employees
  • Promotes security best practices within the team

For example, a security champion in a software development team can help developers prioritize secure coding practices, thereby improving the overall quality and security of the product.


Gamification in Security Training

Security awareness programs can be significantly enhanced through gamification, which involves applying game principles in non-game contexts to increase engagement and motivation.

Common gamification features include:

  • Scoring points
  • Earning badges or achievements
  • Competing or collaborating with others
  • Following defined rules and goals
  • Receiving rewards
  • Building narratives or group stories
  • Avoiding pitfalls and challenges

Gamification encourages active participation and helps reinforce learning outcomes more effectively than traditional methods.


Simulation-Based Training

Simulation environments can be used to test and improve employee readiness for cyber incidents. These simulations provide realistic scenarios that help participants practice decision-making under pressure.

A notable example is PwC’s “Game of Threats”, launched in 2016. This interactive digital game:

  • Simulates real-world cyberattacks
  • Helps senior executives and board members assess their readiness
  • Is designed to be non-technical and accessible
  • Requires participants to make rapid, high-impact decisions with limited resources
  • Provides detailed feedback on strategies, actions, and missed opportunities

The game is based on real-life cyber incidents experienced by organizations, making it a practical and effective training tool.


Continuous Improvement of Training Programs

To remain effective, security awareness training must be:

  • Periodically reviewed and updated
  • Tailored to the target audience

For example, providing secure coding training to senior management would not be appropriate, as it does not align with their roles.

Training updates should be triggered by events such as:

  • Introduction or modification of security policies
  • Emergence of new threats
  • Occurrence of major security incidents
  • Significant changes to information systems

Conclusion

Service Level Requirements and security awareness training are fundamental components of a robust security framework. Clearly defined, measurable service expectations ensure accountability in third-party relationships, while effective training programs empower employees to act as the first line of defense. Together, these practices enhance organizational resilience and reduce the risk of security incidents in an increasingly complex threat landscape.