SecurityScorecard

SecurityScorecard’s integrated solution with Archer helps enterprises manage vendor risk and institutional security. The integrated solution allows organizations to leverage use cases available in Archer and the SecurityScorecard platform, to have a more comprehensive view of vendor risk specific to individual vendors and across their entire organization.

Archer Exchange: With the Archer Exchange, the Archer team has created a broad selection of supplemental, value-added offerings to help you get your unique risk management program on the right path, right from the start. You can leverage the Archer Exchange offerings to expand the use of Archer solutions into new business processes and address specific industry, geographic, regulatory, or technical requirements.

Release notes

Release date

Release

Notes

Version 6.14

July 2024

Resigned expired JS file

Known issues

  • Because of the API request limitations from SecurityScorecard, portfolios with 300+ entries might encounter timeouts when utilizing JavaScript data feeds. Please contact SecurityScorecard if experiencing issues running the data feeds.

  • For more information please visit: https://securityscorecard.readme.io/docs/rate-limits 

Overview of Security Scorecard integration

Key features and benefits

The Security Scorecard integration enables organizations to:

  • Provide cybersecurity ratings for third parties and supporting data to provide detailed and in-depth information on the potential risks within those third parties- in the form of Factor ratings and Finding counts.

  • Enable cyber and risk professionals to assess the cybersecurity of potential business partners and to monitor cybersecurity ratings of existing partners. 

Prerequisites (ODA and system requirements)

The following table lists the components and prerequisites for the SecurityScorecard integration.

Components

Prerequisites

Archer Solution Area(s)

Third Party Management

Archer Use Case(s)

Third Party Catalog

Archer Applications

Third Party Profile

Third Party Engagements

Uses Custom Application

Yes

Requires On-Demand license

1 - 3 Archer On-Demand Application (ODA) licenses are required for this offering.

Archer requirements

Archer 6.14 and later

Partner/Vendor Requirements

Valid Risk Recon License is required

Supported Archer Environments

  • On-Premises

  • Archer SaaS

  • Archer Hosted

Compatible Use Cases and Applications

Related Applications

Application

Use Case

Primary Purpose of the Relationship

Third Party Profile

  • Third Party Catalog

  • Third Party Risk Management

  • Third Party Engagement

  • Operational Scenario Analysis

The Third-Party Profile application is used to document all the third-party relationships used by an organization.      

In this application, the organizational structure of the third-party relationship is established, third party contacts documented, and relationship manager, risk analyst, and procurement / legal officer accountabilities are created.

This application is the hub for navigation throughout the solution and contains summary metrics and reporting.

Engagements

  • Third Party Catalog

  • Third Party Risk Management

  • Third Party Engagement

The Engagements application serves as the repository for all products and services provided by a third-party to the organization. 

Engagements are documented by type, description; and business unit; are associated with the third party delivering the engagement; the associated contracts and business processes and are assigned to an engagement owner and manager.

The Engagements application serves as the focal point for presenting all the engagement-centric risk assessments and performance metrics and financial spend and 4th party supply chain dependencies documented.

Impacted Use Cases

  • Third Party Catalog

  • Third Party Risk Management

  • Operational Scenario Analysis

  • Third Party Engagement

Additional resources

The following additional resources are available for this offering:

SecurityScorecard Integration components

Architecture diagram

The following diagram shows the relationships between the applications that make up SecurityScorecard integration.

A diagram of a server

Description automatically generated

Applications

  • SecurityScoreCard Monitoring

  • SecurityScoreCard Event Log

  • SecurityScoreCard Portfolio

Personas and Access Roles

The following table describes the functions that make up the application’s organization roles. Depending on the organization of your company, these functions and responsibilities may vary.

Name

Type

Install Method

Install Option

Required

SSC: Administrator

Access Role

 

Override Permissions

Recommended

See appendix for Role based permissions and the Group assignments

SSC: Read-Only

Access Role

 

Override Permissions

SSC: User

Access Role

 

Override Permissions

SecurityScorecard Event Log

Application

Create New Only

Do not Override Layout(s)

Required

SecurityScorecard Monitoring

Application

Create New Only

Do not Override Layout(s)

Recommended

SecurityScorecard Portfolio

Application

Create New Only

Do not Override Layout(s)

Required

SecurityScorecard

Dashboard

Create New Only

Do not Override Layout(s)

Required

SecurityScorecard Assessment

Questionnaire

Create New Only

Do not Override Layout(s)

Required

SecurityScorecard

Workspace

Create New Only

Do not Override Layout(s)

Required

SecurityScorecard Portfolio: Bottom 10 Companies

Report

Create New Only

 

Required

SecurityScorecard Portfolio: Company Score Distribution

Report

Create New Only

 

Required

SecurityScorecard Portfolio: SecurityScorecard Portfolio

Report

Create New Only

 

Required

SecurityScorecard Portfolio: SSC Scheduled Report Distribution

Report

Create New Only

 

Required

SecurityScorecard Portfolio: Top 10 Risk Factors

Report

Create New Only

 

Required

Role and Group Assignments

The following table describes the Role based permissions and the Group assignments included with this package:

 

SSC: Administrator

SSC: User

SSC: Read Only

Page Name

C

R

U

D

C

R

U

D

C

R

U

D

SecurityScorecard Assessment: Content Record

X

X

X

X

 

X

X

 

 

X

 

 

SecurityScorecard Assessment: Data Import

X

X

X

X

 

 

 

 

 

 

 

 

SecurityScorecard Assessment: Email Option

 

X

 

 

 

X

 

 

 

X

 

 

SecurityScorecard Assessment: Export Options

 

X

 

 

 

X

 

 

 

X

 

 

SecurityScorecard Assessment: Print Option

 

X

 

 

 

X

 

 

 

X

 

 

SecurityScorecard Assessment: Save Report

X

X

X

X

X

X

X

X

X

X

X

X

SecurityScorecard Assessment: Schedule

X

X

X

X

X

X

X

X

 

 

 

 

SecurityScorecard Event Log: Content Record

X

X

X

X

 

X

 

 

 

X

 

 

SecurityScorecard Event Log: Data Import

X

X

X

X

 

 

 

 

 

 

 

 

SecurityScorecard Event Log: Email Option

 

X

 

 

 

X

 

 

 

X

 

 

SecurityScorecard Event Log: Export Options

 

X

 

 

 

X

 

 

 

X

 

 

SecurityScorecard Event Log: Print Option

 

X

 

 

 

X

 

 

 

X

 

 

SecurityScorecard Event Log: Save Report

X

X

X

X

X

X

X

X

X

X

X

X

SecurityScorecard Monitoring: Content Record

X

X

X

X

 

X

 

 

 

X

 

 

SecurityScorecard Monitoring: Data Import

X

X

X

X

 

 

 

 

 

 

 

 

SecurityScorecard Monitoring: Email Option

 

X

 

 

 

X

 

 

 

X

 

 

SecurityScorecard Monitoring: Export Options

 

X

 

 

 

X

 

 

 

X

 

 

SecurityScorecard Monitoring: Print Option

 

X

 

 

 

X

 

 

 

X

 

 

SecurityScorecard Monitoring: Save Report

X

X

X

X

X

X

X

X

X

X

X

X

SecurityScorecard Portfolio: Content Record

X

X

X

X

 

X

 

 

 

X

 

 

SecurityScorecard Portfolio: Data Import

X

X

X

X

 

 

 

 

 

 

 

 

SecurityScorecard Portfolio: Email Option

 

X

 

 

 

X

 

 

 

X

 

 

SecurityScorecard Portfolio: Export Options

 

X

 

 

 

X

 

 

 

X

 

 

SecurityScorecard Portfolio: Print Option

 

X

 

 

 

X

 

 

 

X

 

 

SecurityScorecard Portfolio: Save Report

X

X

X

X

X

X

X

X

X

X

X

X

Group Assignments:

SecurityScorecard Administrators

SecurityScorecard Users

SecurityScorecard Read Only

Installing the Security Scorecard integration

This section provides instructions for configuring Security Scorecard with the Archer Platform.  This document is not intended to suggest optimum installations or configurations.  

It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products to install the required components.

All components must be installed and working prior to the integration. Perform the necessary tests to confirm that this is true before proceeding.  

Important: The integration described in this guide is provided as a reference implementation for evaluation and testing purposes.  It may or may not meet the needs and use cases for your organization.  If additional customizations or enhancements are needed, it is recommended that customers contact Archer Professional Services for assistance.

Installing the package

To configure the Archer platform, you must first download the installation package from the Archer Exchange and extract the following components:  

File Name  

Description  

SecurityScorecard_Archer_6.14.zip  

SecurityScorecard Application Package  

SSC Images  

12 Image files to be used for company grades and factor grades.   

Data Feeds  

Data feed configuration for SecurityScorecard integration. Contains 6 data feed files:

SSC_0__Event_Log_Nightly_Cleanup.dfx5  

SSC_1__Events_Nightly_Cleanup.dfx5  

SSC_2__Sync_Portfolio.dfx5  

SSC_3__Sync_Industry_Factor_Scores.dfx5  

SSC_4__Get_Historical_Scores.dfx5  

SSC_5__Get_Event_Logs.dfx5  

Configure SecurityScorecard

A Standard or Enterprise SecurityScorecard account is required for this integration. The user must initially login to their SSC account and generate an API key. The Portfolio ID of the Portfolio selected for synchronization with Archer must also be determined. Upon configuration, the Archer data feeds will communicate with the SecurityScorecard Platform adding all 3rd Party records from the SecurityScorecard Platform to Archer.     

Setting Up Data Feeds

Validating the SecurityScorecard Use Case

Using the SecurityScorecard Integration

After installation is complete, you are now ready to use the solution and begin receiving

SecurityScorecard data. The first step is to populate the SecurityScorecard Domain field with the domain of each Third Party Profile in Archer. This field is found on the SecurityScorecard tab of the Third Party Profile. Be sure to correctly enter the domain name by excluding any prefixes and extra text. An example of a correctly formatted domain entry is securityscorecard.com.

Certification Environment

Date Tested: July 2024

Product Name

Version Information

Operating System

Archer

6.14

Virtual Appliance

SecurityScorecard

NA

NA