Live Webinar | 26 June 2025 9AM PT
From Black Box to Boardroom: Operationalizing Trust in AI Governance
October 23, 2024

Lanes in the road: How small and medium businesses can allocate cybersecurity responsibility

After suffering a devastating ransomware attack in early 2023, the law firm Mastagni Holstedt turned around and sued its Managed Service Provider (MSP), LanTech. While the legal case is still open, some important details from it illustrate key lessons for small and medium businesses (SMB) when it comes to cybersecurity.

First of all, the law firm and MSP appear to have only had a verbal contract to provide services. This makes it very difficult to determine who was accountable for doing what.

Additionally, the law firm found out that its backups - stored with the service provider Acronis - had been deleted prior to the activation of the ransomware. This is a common technique for ransomware gangs. They understand that if a victim has backups of its data, the ransom demand will not be especially effective.

Acronis, however, noted that some of the firm's own credentials were used to delete the backups. It would be difficult to fault a software provider for granting access to a user with legitimate credentials, even if after the fact it turned out that the user was malicious. If the opposite situation occurred - where Mastagni Holstedt needed to access its backups but was denied access by Acronis due to a (false positive) indication of suspicious activity - it's easy to see the law firm being equally angered.

Unfortunately, confusion like this is quite prevalent in the security world. So in this post, we'll look at some common techniques for assigning roles and responsibilities when it comes to managing cybersecurity, compliance, and privacy risk. Many of the suggestions are applicable both internally and externally with employees, contractors, vendors, and even customers.

Step 1: Use RACI to clearly define roles

A traditional tool for assigning roles is the RACI matrix. The acronym spells out those who are:

about an action needing to be completed.

The first step towards building cybersecurity responsibility is providing an excellent framework for assigning tasks related to risk management. For example, assume a company needs to collect compliance-related documentation ahead of an upcoming audit. It could allocate duties in the following way:

  • Responsible - Governance, Risk, and Compliance (GRC) analysts. Individual contributors like these analysts would be responsible for doing the actual work of collecting the evidence, adding it to the appropriate repositories, and confirming completion of the work. Alternatively, if they have the right tools, they could likely automate most of this process.
  •  
  • Accountable - Director of GRC. This person likely wouldn't be doing the work personally, but would be accountable for the accomplishment of the final goal. Only one person can hold this role, as it requires making decisions in a way that impacts the outcome of the task.
  •  
  • Consulted - Individual business unit leaders. Collecting evidence will likely require the GRC analysts to access a variety of systems, many of which will be owned by other business units like marketing, human resources, and information technology. Thus, the heads of these organizations will require consultation to ensure they are aligned and supporting the mission.
  •  
  • Informed - Vice President (VP) of Operations. Finally, the VP of Operations is unlikely to be involved in the day-to-day of the evidence collection operation, but will have a vested interest in the outcome. Thus, this person should be informed upon completion or if the team encounters any problems requiring additional assistance.

An effective RACI matrix clarifies accountability, reduces uncertainty, and speeds task completion. Similarly, risk ownership is a process that benefits greatly from a structured approach.

Step 2: Document risk ownership clearly using a single source of truth

As an organization grows and matures, it will identify more and more security and compliance risks. While this is normal, the key is managing these risks effectively. We've already talked about the four ways in which businesses can do so (accept, mitigate, transfer, and avoid). But in this section, we'll discuss how they can track these types of decisions effectively.

At the center of a risk ownership program is a risk register. This is the single source of truth that identifies all of the potential issues facing a company, who is accountable for (or owns) them, what decision that person has made about the risk, and when to revisit that decision.

By clarifying things in this manner, everyone in the organization can have an informed discussion about the business's challenges, the resources available to tackle them, and the most efficient way to use them.

With that said practices to avoid include:

Using a purpose-built GRC tool can save you huge amounts of time and effort when constructing your risk register. And it can help you avoid some of these common pitfalls.

Step 3: Vet third parties

In addition to measuring risks posed by internal factors (employee awareness, vulnerabilities in self-hosted applications, lack of appropriate policies and procedures, etc.), understanding external factors is equally - and potentially more - important from a risk assignment perspective.

Third parties such as vendors, but also open source projects, can introduce substantial risks into your supply chain and business operations. Developing an effective set of tools to measure this risk can help you to make informed decisions.

Some example practices include:

  • Sending security questionnaires to vendors with access to business-critical data to understand their access control, disaster recovery, encryption, vulnerability management and related procedures. Tracking all of their responses in a single place becomes increasingly vital as you scale.
  •  
  • Reviewing third-party attestation reports, like System and Organization Controls (SOC) 2, and certifications, like ISO 27001. While not foolproof, these standards require adhering to a minimum baseline of security, privacy, and compliance practices.
  •  
  • Using a security ratings tool to understand vendor risk dynamically. A variety of offerings exist to help companies understand the relative security posture of their suppliers. These tools monitor things like open ports, unpatched vulnerabilities, and similar external indicators of the relative risk posed to a network.

While knowing is half the battle, the other half of the battle is equally important. This consists of actually doing something about the risks you've identified.

Step 4: Distribute risk using contracts

As Mastagni Holstedt discovered, its expectations of what its MSP would offer in terms of security protections varied greatly from what the law firm actually got. Without a formal written contract, it's highly likely both parties had different understandings about their roles and responsibilities.

Contracts are the best way to clarify mutual understanding about each party's responsibilities when it comes to security and compliance. Some example ways to use a contract this way include:

  • Requiring a vendor to maintain ISO 27001 certification as a condition of continued business. Because the standard requires annual surveillance audits, a contractual requirement like this can help to prevent a vendor from experiencing configuration drift, where the day-to-day realities of business operations mean that its security posture degrades over time.
  •  
  • Establishing service level agreements (SLA) regarding data confidentiality, integrity, and availability. While SLAs addressing the latter are most common, it is certainly conceivable that organizations could assign risks related to data breaches or corruption using an SLA.
  •  
  • Mandating that a vendor participates in your organization's bug bounty program. While running a bug bounty program requires a high level of maturity, it makes sense to include key parts of your supply chain in it once it is up and running. By paying ethical hackers to identify flaws in both your and your suppliers' networks, you can help to improve everyone's security.

Step 5: Apply compensating controls

If, after doing all of the above, however, you determine that there is still unmanaged risk, you have some difficult choices to make. Aside from terminating the vendor contract (avoiding the risk) or just accepting the residual risk, you can take creative approaches to dealing with it.

  • If you have concerns about a vendor's data security practices but still need to use it anyway, you could explore methods of risk mitigation like double encryption. With this approach, you may be able to apply your own encryption layer - controlled with keys you manage - underneath the encryption layer the vendor applies to data sitting on its systems. While this can be logistically challenging, it does provide you additional assurance about your data's security in the event of a breach.
  •  
  • Alternatively, you may simply decide to increase your cyber insurance coverage as a result of security gaps you identify in a vendor. Using this additional cost as leverage during negotiations can help you to offset some or all of the increased premium. Additionally, this will likely encourage the vendor to address the underlying security issue.

Conclusion

Confusion and ambiguity are just part of life when it comes to business, and that extends to security. With that said, maximizing clarity to the utmost extent possible will go a long way toward improving your GRC program. When all stakeholders - internal and external - fully understand what is expected of them, they are best equipped to achieve their goals.

To make this happen, SMBs often rely on a patchwork of systems, from Slack to Jira to spreadsheets. Unfortunately, this approach quickly breaks down as the organization grows. That is the exact reason why we designed the Scrut GRC automation platform. It is your one-stop shop for:

  • Risk and vendor management.
  •  
  • Cloud asset management.
  •  
  • Audit evidence collection.
  •  
  • Much, much more.

Ready to check out what the Scrut platform can do for you? Book a demo!

Liked the post? Share on:
Table of contents
Join our community
Join our community and be the first to know about updates!
Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Join our community and be the first to know about updates!

Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Related Posts

HIPAA
Compliance Essentials
Understanding HIPAA violations: Types, prevention, and best practices
HIPAA
PHI vs PII: Essential comparisons, compliance differences, and a focused checklist
GDPR
Risk Management
Best GDPR Compliance Automation Software in 2025: Features, Pricing, Pros & Cons

Ready to see what security-first GRC really looks like?

Ready to see what security-first GRC really looks like?

Ready to see what security-first GRC really looks like?

See what a real security- first GRC platform looks like

Ready to see what security-first GRC really looks like?

Focus on the traveler experience. We’ll handle the regulations.

Get Scrut. Achieve and maintain compliance without the busywork.

Choose risk-first compliance that’s always on, built for you, and never in your way.

Ready to see what security-first GRC
One platform, every framework. No more duplicate work.
You can’t manage user access if you’re always playing catch-up.
Explore the future of enterprise GRC
Tired of chasing vendors for risk assessments?

Join the thousands of companies automating their compliance with Scrut.

The right partner makes all the difference. Let’s grow together.

Make your business easy to trust, put security transparency front and center.

Risk-first security starts with risk-first visibility.
Secure your team from the inside out.
Don't settle for slow, expensive compliance. Get Scrut instead.
Risk-first compliance for forward-thinking teams.
Audits without the back-and-forth. Just seamless collaboration.
Scale fast. Stay compliant. Automate the rest.
Compliance? Done and dusted, in half the time.
Get ahead of GDPR compliance before it becomes a problem.
Outgrowing table-stakes compliance? Create custom frameworks with ease.
Navigate SOC 2 compliance, minus the stress.
PCI DSS compliance, minus the panic.
Take the wheel of your HIPAA certification journey today.
We’ve got what you need to fast-track your ISO 27001 certification.
Make your NIST AI RMF journey as smooth as possible.

Your GRC team, multiplied and AI-backed.

Modern compliance for the evolving education landscape.

Ready to simplify healthcare compliance?

Don’t let compliance turn into a bottleneck in your SaaS growth.

Find the right compliance frameworks for your business in minutes

Ready to see what security-first GRC really looks like?

Real-time visibility into every asset

Ready to simplify fintech compliance?

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.

Scrut helps you streamline audits, close deals faster, and stay ahead of risk without slowing down your team. Because trust shouldn’t take months to earn.

Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.

Tag, classify, and monitor assets in real time—without the manual overhead.

Whether you're entering new markets or launching new products, Scrut helps you stay compliant without slowing down.

Scrut pulls compliance data straight from the tools you already use—so you don’t have to dig for evidence, chase approvals, or manually track controls.

Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.

With Scrut, you’re not just adding a tool to your offering—you’re adding a competitive edge. Join our Partner Network and help your clients streamline their GRC program.

Gaining trust is your first step to growing and cracking better deals. The Scrut Platform comes pre-built with all the tools you need to showcase a firm security posture and build confidence.

Don’t settle for rigid systems—Scrut ensures your risk management strategy is as flexible as your business needs.

Start building a security-first culture. Save your operations from improper training and a lack of compliance awareness.

Scrut fast-tracks compliance so you can focus on scaling, not scrambling. Automate compliance tasks and accelerate enterprise deals—without the grind.

Automate assessments, track compliance, and get full visibility into third-party risk—all in one place.

Scrut automates compliance tasks, supports proactive risk management, and saves you time, so you can focus on growing your business. Start building trust with customers and scaling confidently.

Leave legacy GRC behind. Meet the AI-powered platform built for teams managing risk and compliance in real time.

Give auditors direct access, keep track of every request, and manage audits effortlessly—all in one place.

Scrut ensures access permissions are correct, up-to-date, and fully compliant.

Whether you need fast results or a fully tailored program mapped to your risks and needs, Scrut delivers exactly what you need, when you need it. Ready to start?

Scrut unifies compliance across all your frameworks, so you can stop juggling systems and start scaling securely.

Manually managing your compliance processes and audits can get inefficient and overwhelming. Scrut automates these outdated, manual processes and eliminates your last-minute worries.

Access automated compliance, real-time risk tracking, and expert-backed support—all in one platform. Get started with Scrut!

Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Earn trust and back it up with solid evidence. Scrut takes you through the SOC 2 compliance journey step-by-step, navigating every complexity you face.

Manage your PCI DSS compliance with real-time monitoring and effortless automation. Get started with Scrut today!

Securing your PHI shouldn’t be a constant hassle. Scrut automates your workflows—from risk assessments to monitoring—so you can put your compliance worries on the back burner.

Automate security controls, simplify audits, and keep your ISMS aligned with the latest standards. Get started with Scrut!

Tackle potential AI risks with NIST AI RMF-compliant controls and get expert support every step of the way.

Offload the grunt compliance work to us. Execute manual, draining GRC tasks with the reliable AI-powered Scrut Teammates without switching contexts or bottlenecks.

Whether you're managing student data, partnering with educational institute, or expanding to new geographies—Scrut gives you the tools to stay compliant, manage risk, and build trust at every step.

Scaling healthcare doesn’t have to come at the cost of security. Scrut keeps your organization compliant, audit-ready, and protected—no matter how fast you grow.

Scrut automates the hard parts of compliance and security so you can move fast and stay ahead of risks from day one.

The Scrut Platform helps you move fast, stay compliant, and build securely from the start.

Growth in fintech comes with heavy scrutiny. Scrut helps you stay compliant, audit-ready, and secure—without slowing down your momentum.

Book a Demo
Book a Demo
Join the Scrut Partner Network
Join the Scrut Partner Network