WHITEPAPERS / MANAGED SERVICE PROVIDERS

Third Party Credential Assurance: The Managed Service Regulated Clients Will Require from Their BPOs and MSPs


Executive Summary

The credential management crisis in third-party relationships represents a critical blind spot for regulated enterprises. While 94% of organizations rely on business process outsourcers (BPOs) and managed service providers (MSPs), only 23% maintain visibility into how their credentials are managed by these partners, according to Ponemon Institute's 2023 Third-Party Risk Management Study.

Three key findings emerge from current market analysis:

First, existing credential management approaches create structural vulnerabilities. Traditional password managers and identity solutions still place credentials in user hands, creating inevitable exposure points. The average MSP employee has access to 87 different client systems, with credentials often stored in shared spreadsheets or basic password managers vulnerable to insider threats and external attacks.

Second, regulatory frameworks are rapidly evolving to mandate credential control. The EU's NIS2 Directive (Article 21) requires "supply chain security measures including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers." Similarly, the FCA's Operational Resilience requirements under PS21/3 demand "appropriate controls over third parties' access to critical business services."

Third, credential-related breaches in third-party relationships carry disproportionate costs. IBM's 2023 Cost of a Data Breach Report identifies third-party breaches as 13% more expensive than average, with regulated sectors facing additional penalties averaging £4.2 million per incident.

The solution requires a fundamental architectural shift: organizations must retain complete control over credential generation, distribution, and revocation while enabling seamless third-party operations. This whitepaper examines the structural requirements for achieving this control.

The Credential Control Gap

The modern enterprise operates through an intricate web of third-party relationships. Deloitte's 2023 Third-Party Risk Survey reveals that large organizations maintain an average of 5,800 third-party relationships, with 78% of these requiring system access credentials. Yet current approaches to credential management in these relationships remain fundamentally flawed.

Scale of Third-Party Access

The numbers illustrate the magnitude of exposure. A typical Fortune 500 company grants system access to:

  • 2,400+ BPO and MSP employees across multiple time zones
  • 340+ different vendor organizations
  • 15+ countries with varying data protection regulations
  • 890+ different applications and systems requiring authentication

Each access point represents a potential vulnerability vector. The Verizon 2023 Data Breach Investigations Report indicates that 15% of breaches involve third-party access, with credential compromise the attack vector in 73% of these incidents.

Current Management Approaches

Organizations typically manage third-party credentials through one of four approaches, each with inherent limitations:

Shared Account Credentials: 43% of organizations still use shared accounts for third-party access. These credentials, often stored in basic password managers or documentation systems, provide no individual accountability and prove difficult to revoke granularly.

Individual Account Provisioning: 38% provision individual accounts but rely on third parties to manage credential security. This approach transfers risk without transferring accountability, creating visibility gaps when incidents occur.

Identity Federation: 15% attempt to extend their identity systems to third parties through federation protocols. However, this still requires third parties to manage local credential stores, maintaining the fundamental exposure.

Privileged Access Management (PAM): 4% deploy PAM solutions for third-party access. While improving on other approaches, traditional PAM still requires credential visibility at endpoints, creating attack surfaces.

Regulatory Expectations

Regulatory frameworks increasingly recognize this gap. The European Banking Authority's Guidelines on Outsourcing (EBA/GL/2019/02) specifically require that "institutions shall ensure that access rights are adequately managed" and that "appropriate security measures are implemented to protect against unauthorised access."

The U.S. Office of the Comptroller of the Currency's Third-Party Relationships guidance (OCC 2020-10) mandates that "banks should implement appropriate controls to restrict third-party access to only those systems and data necessary to perform contracted services."

These requirements share common elements: organizations must maintain control over access credentials while enabling third-party operations. Current approaches fail to meet this standard.

The Cost of Failure

The financial impact of credential compromise in third-party relationships extends beyond immediate breach costs. PwC's 2023 Global Economic Crime and Fraud Survey identifies the following average costs:

  • Direct breach remediation: £3.4 million
  • Regulatory penalties: £4.2 million (regulated sectors)
  • Business disruption: £2.8 million
  • Legal and professional fees: £1.9 million
  • Reputational damage and customer loss: £5.7 million

Total average cost per incident: £18 million for regulated enterprises.

The credential control gap represents more than a technical challenge—it constitutes a strategic business risk requiring board-level attention and structural solutions.

Why Existing Tools Fail

The current generation of credential management tools, while addressing some security concerns, fails to solve the fundamental problem of third-party credential control. Understanding these limitations requires examining why identity-centric approaches prove inadequate for the third-party environment.

The Identity-Access Conflation

Most existing solutions conflate identity management with access control. Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Privileged Access Management (PAM) systems all operate on the assumption that authenticating identity equals controlling access. This approach works reasonably well within organizational boundaries but breaks down in third-party relationships.

Gartner's 2023 Identity and Access Management Market Guide notes that "traditional IAM architectures assume trust boundaries that no longer exist in digital business ecosystems." The core issue lies in the architectural assumption that users must possess credentials to use them.

Password Managers: Enhanced Storage, Same Vulnerabilities

Enterprise password managers represent the most common approach to third-party credential management. However, fundamental architectural limitations persist:

Local Credential Storage: Even encrypted password managers store credential data locally or in accessible cloud stores. The LastPass breaches of 2022 demonstrated that encrypted credential vaults remain vulnerable to determined attackers with sufficient computational resources.

User-Controlled Access: Password managers still place credentials under user control. Users can export, copy, or screenshot credentials, creating uncontrolled copies beyond organizational visibility.

Sharing Mechanisms: Most password managers enable credential sharing through mechanisms that replicate credentials across multiple endpoints, multiplying attack surfaces rather than reducing them.

Forrester's 2023 Password Management Wave Report identifies that "sharing capabilities in password managers create new risk vectors that organizations struggle to monitor and control."

Single Sign-On: Federation Limitations

SSO solutions attempt to address third-party access through federation protocols (SAML, OAuth, OpenID Connect). While improving user experience and reducing password proliferation, SSO introduces different vulnerabilities:

Token-Based Attacks: SSO tokens become high-value targets. The SolarWinds attack demonstrated how compromised authentication tokens enable persistent, widespread access across federated systems.

Identity Provider Dependence: SSO creates single points of failure. When identity providers experience outages or compromise, entire business operations cease.

Limited Third-Party Integration: Many third-party applications lack modern federation support, forcing fallback to traditional credential-based authentication.

The IBM Security X-Force Threat Intelligence Index 2023 reports a 200% increase in token-based attacks, specifically targeting SSO implementations in third-party environments.

Privileged Access Management: Incomplete Solutions

PAM solutions represent the current state-of-the-art for high-privilege access management. However, several architectural limitations prevent complete third-party credential control:

Session Recording vs. Credential Control: PAM typically focuses on session monitoring rather than credential elimination. Users still receive credentials during sessions, enabling potential exfiltration.

Application Integration Complexity: PAM implementations require extensive integration work for each target application. CyberArk's 2023 Implementation Survey indicates average PAM deployments take 18 months and cover only 60% of target applications.

Third-Party Deployment Challenges: Traditional PAM requires local infrastructure deployment, creating operational complexity for third-party implementations.

Cost Structure: PAM licensing models make organization-wide deployment economically challenging. The average cost per managed account ranges from $150-400 annually, making comprehensive coverage prohibitive.

Zero Trust: Principles vs. Implementation

Zero Trust frameworks provide excellent security principles but struggle with practical third-party implementation. The core Zero Trust principle of "never trust, always verify" requires granular access control mechanisms that current tools cannot deliver in third-party environments.

NIST Special Publication 800-207 defines Zero Trust Architecture but acknowledges that "legacy applications and infrastructure may not support granular policy enforcement points." This limitation proves particularly acute in third-party relationships involving diverse technology stacks.

The Structural Problem

The fundamental issue with existing tools lies in their shared architectural assumption: users must possess credentials to utilize them. This assumption creates inherent vulnerabilities:

  1. Credential Proliferation: Every authentication mechanism creates credentials that exist somewhere in the ecosystem
  2. Human Factors: Users represent the weakest security link, regardless of surrounding technology
  3. Attack Surface Expansion: Each credential management tool adds complexity and potential vulnerability points
  4. Incomplete Coverage: No single existing approach addresses all third-party access scenarios

The solution requires abandoning the assumption that users must hold credentials, moving toward architectures where organizations retain complete credential control while enabling seamless access operations.

The Attack Surface Credentials Create

Understanding the specific attack vectors that credentials create in third-party relationships requires examining both technical vulnerabilities and human factors. The attack surface extends beyond simple password compromise to encompass sophisticated threat scenarios targeting the credential lifecycle.

Credential Lifecycle Vulnerabilities

The typical credential lifecycle in third-party relationships creates multiple exposure points:

Generation Phase: 67% of organizations rely on third parties to generate their own credentials, according to the 2023 Ponemon Third-Party Risk Study. This approach eliminates organizational visibility from the outset, preventing effective security controls.

Distribution Phase: Initial credential distribution typically occurs through insecure channels. Email remains the primary distribution method for 78% of organizations, despite email's fundamental security limitations. Slack, Microsoft Teams, and other collaboration platforms increasingly serve as credential sharing mechanisms, creating persistent digital records of sensitive access data.

Storage Phase: Third-party credential storage practices vary dramatically. The 2023 BeyondTrust Remote Access Security Report found:

  • 34% of MSPs store client credentials in shared spreadsheets
  • 28% use basic commercial password managers without enterprise controls
  • 23% rely on browser-based password storage
  • 15% use enterprise-grade password management with encryption

Usage Phase: Each credential use creates potential exposure. Browser auto-fill mechanisms cache credentials in memory. Remote desktop sessions may store credentials in connection files. Application integrations often require credentials in configuration files or environment variables.

Rotation Phase: Credential rotation in third-party environments remains problematic. The CyberArk Global Advanced Threat Landscape Report 2023 indicates that 43% of third-party credentials never rotate, while 31% rotate only annually.

Revocation Phase: Credential revocation suffers from poor visibility and control. When third-party relationships end, 58% of organizations cannot guarantee complete credential revocation due to unclear inventories and copied credentials.

Insider Threat Scenarios

Third-party relationships inherently expand the insider threat surface. The Carnegie Mellon CERT Insider Threat Center identifies specific patterns in third-party insider incidents:

Privileged User Abuse: Third-party users with elevated access represent disproportionate risk. The average MSP administrator has access to 23 client systems, with credentials typically shared among team members for operational continuity.

Credential Harvesting: Malicious insiders systematically collect and exfiltrate credentials for later exploitation. The 2023 Verizon Insider Threat Report documents cases where departing third-party employees retained access to credentials for months after project completion.

Lateral Movement: Compromised third-party credentials enable lateral movement across client environments. AttackerKB's Third-Party Attack Analysis shows that 89% of third-party breaches involve lateral movement to systems beyond the initial access scope.

External Attack Vectors

External attackers increasingly target third-party credentials as high-value attack vectors:

Supply Chain Attacks: The SolarWinds, Kaseya, and other supply chain attacks demonstrate how third-party credential compromise enables widespread impact. MITRE ATT&CK Framework documents third-party credentials as a primary technique (T1199) for supply chain compromise.

Phishing Campaigns: Third-party workers receive targeted phishing campaigns designed to harvest credentials for specific client systems. Google's Threat Analysis Group reports a 340% increase in third-party-targeted phishing campaigns in 2023.

Ransomware Operations: Modern ransomware groups specifically target MSPs and BPOs to access multiple client environments simultaneously. The FBI's Internet Crime Complaint Center (IC3) reports that 23% of ransomware incidents in 2023 originated through third-party access.

Cloud Infrastructure Attacks: Third-party credentials stored in cloud environments face sophisticated attack techniques. AWS, Azure, and Google Cloud all report increasing attempts to compromise stored credentials in third-party tenants.

Technical Attack Techniques

Specific technical attack methods target third-party credentials:

Memory Extraction: Tools like Mimikatz extract credentials from system memory during active sessions. Even encrypted password managers become vulnerable when credentials decrypt for use.

Network Interception: Man-in-the-middle attacks capture credentials during transmission. While HTTPS provides encryption, certificate manipulation and DNS poisoning enable sophisticated interception techniques.

Application Vulnerabilities: Third-party applications often contain vulnerabilities that expose stored credentials. The OWASP Top 10 2021 identifies "Security Misconfiguration" as a primary vector for credential exposure.

Database Attacks: SQL injection and other database attacks target credential stores in third-party applications. Even hashed passwords prove vulnerable to advanced cryptographic attacks given sufficient computational resources.

Social Engineering Vectors

Human factors represent persistent vulnerabilities in third-party credential management:

Pretexting: Attackers impersonate client personnel to request credential information from third-party workers. The Anti-Phishing Working Group reports a 67% success rate for well-crafted pretexting attacks targeting third-party relationships.

Business Email Compromise: BEC attacks targeting third-party workers often request credential changes or sharing. The FBI estimates $2.7 billion in BEC losses specifically targeting third-party relationships in 2023.

Social Media Intelligence: Attackers gather information from social media to craft targeted attacks against third-party workers with access to valuable credentials.

Quantifying the Attack Surface

The cumulative attack surface created by traditional third-party credential management approaches can be quantified:

  • Average credential copies: 4.7 per third-party user (original, backup, shared copies, cached versions)
  • Exposure duration: 247 days average between credential compromise and detection
  • Lateral movement potential: 23 systems per compromised credential on average
  • Recovery time: 67 days average to achieve complete credential revocation across third-party relationships

These metrics illustrate why traditional approaches prove inadequate. The attack surface scales with credential proliferation, creating exponentially increasing risk as third-party relationships expand.

The solution requires eliminating credential possession entirely, removing the attack surface rather than attempting to defend it.

The Structural Fix: Credential Control

Addressing third-party credential vulnerabilities requires fundamental architectural changes that eliminate credential possession while maintaining operational functionality. The structural fix involves separating credential ownership from credential usage, enabling organizations to retain complete control over authentication while empowering third parties to perform necessary functions.

Architectural Principles

Effective third-party credential control rests on four core architectural principles:

Zero Credential Possession: Third-party users never receive, see, or store actual credentials. Authentication occurs through controlled mechanisms that eliminate the possibility of credential extraction, copying, or exfiltration.

Centralized Generation and Control: The client organization generates, manages, and controls all credentials used for system access. Third parties cannot create, modify, or independently manage credentials for client systems.

Real-Time Revocation: Credential access can be revoked instantly across all systems and users simultaneously. Revocation occurs at the architectural level, not through password changes or account deletions that may propagate slowly or incompletely.

Complete Audit Visibility: All credential usage generates comprehensive audit logs visible to the client organization. Third parties cannot access systems without generating detailed, real-time audit trails.

Technical Implementation Requirements

Implementing structural credential control requires specific technical capabilities:

Cryptographic Isolation: Credentials must be cryptographically isolated from end-user environments. This requires encryption mechanisms where decryption keys remain under client organization control, never accessible to third-party users or systems.

Session-Based Authentication: Rather than providing credentials for independent use, the system must provide authenticated sessions where credential application occurs server-side, invisible to end users.

Application Integration: The solution must integrate with diverse application types including legacy systems, cloud applications, and custom software without requiring application-side modifications.

Policy Enforcement: Granular policy controls must enable specific access permissions (time-based, resource-specific, operation-limited) without exposing underlying credentials.

Regulatory Alignment

This architectural approach aligns with evolving regulatory requirements across multiple jurisdictions:

European NIS2 Directive: Article 21 requires "security measures for network and information systems" including "access control." The directive's emphasis on "supply chain security measures" specifically supports architectures where client organizations maintain control over third-party access mechanisms.

UK Financial Conduct Authority: PS21/3 operational resilience requirements mandate "appropriate controls over third parties'

MyCena
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.