Legal Alert
Crucial Lesson from the CrowdStrike Outage: Assess Your Cybersecurity Supply Chain
August 9, 2024
Millions of computers around the world running on the Windows operating system were recently disabled—not by hackers, but by a faulty software update released by CrowdStrike. The cybersecurity vendor's error, which hobbled airlines and disrupted hospitals and other businesses, was compounded by bad actors that came out with a “quick fix” that planted malware in affected systems.
The shockwaves from the CrowdStrike incident continue to spread, and naturally companies are feeling increasingly vulnerable.
Fortunately, there is a way for companies to minimize possible future damage in the event of a similar cyber attack. A good place to start is to focus on your cybersecurity supply chain management policies and procedures.
Review Your Cybersecurity Contracts
Each vendor that provides cybersecurity products or services to your company, as Crowdstrike did for many, should have an agreement that governs the relationship. The agreement should be structured and customized based on what that vendor provides and not reflect a one-size-fits-all approach. Some vendors provide mission-critical products or services, others do not. For those that do, a more cautious and thorough approach to the contract review and negotiations is advisable.
An agreement based on the vendor’s standard form is likely to contain language that is favorable to the vendor, including very limited (if any) indemnification provisions and a low liability cap. Companies should make sure that the agreements require the vendor be liable for and indemnify the company for damages arising from these cyber attacks (with no liability cap or a super cap for these damages) and have adequate cyber insurance. The vendor knows best what could go wrong in the deal, so it is reasonable to demand it has appropriate mitigation measures in place and explicitly identifies those measures in the agreement. Excusing the vendor’s performance (i.e., carve-out from liability or indemnification provision) should be limited only to incidents that are outside of its reasonable control.
An incident outside of a vendor’s reasonable control is what the force majeure clause is for. It is typically found towards the end of the main part of the agreement and is often overlooked. Again, if you are working off the vendor’s form, watch out for language that lets the vendor use it to get off the hook. The key is to carefully word the clause in such a way that the vendor’s ability to use it as a means to excuse its obligations is very limited. Consider, for example, a cybersecurity error by someone in the vendor’s own supply chain. The vendor might want to use that as an excuse for offloading any liability, but that should not be allowed to count as a force majeure incident. Preventing something like this from derailing the vendor’s services is usually within the vendor’s control, and the language in the clause should reflect that. Another thing a force majeure provision can give you is the right to terminate the agreement if the vendor cannot perform its obligations due to a cyber attack and its failure remains ongoing for a period of time you specify.
Your IT and security teams should also review the security standards in the agreement to ensure that the vendor has appropriate physical, administrative, and technical controls. If the contract involves a mission-critical product or service or touches key data, systems, or infrastructure, the company should consider having its own mandatory security terms to which the vendor must agree.
Negotiating these agreements requires consideration of many variables: the vendor’s size, its financial and operational capacity, the size of its end user base, its track record, your risk tolerance, the value of the contract, alternative service providers, etc. That information should help determine, for example, which checklists to use, what language to avoid, and what to require. This will help ensure the agreement you sign fits your needs.
We Can Help
Maslon attorneys can guide businesses needing legal assistance with their cybersecurity supply chain management and other complex issues. Reach out to us to ensure you are prepared to minimize possible damage in the future.