Zum Hauptinhalt springen
Elementary Threat · BSI IT-Grundschutz

G 0.11 — Failure or Disruption of Service Providers

Updated on 4 min Reviewed by: Cenedril Editorial
A.5.15A.5.19A.5.20A.5.21A.5.22A.5.23A.5.24A.5.25A.5.26A.5.27A.5.29A.5.30A.6.7A.8.1A.8.5A.8.7A.8.14A.8.20A.8.21A.8.22A.8.30 BSI IT-GrundschutzISO 27001ISO 27002

The cloud provider that runs a company’s complete bookkeeping files for insolvency. The platform is from now on only partially available. A data export is theoretically possible, but the export function does not work reliably. The company has neither a local backup of the accounting data nor an exit strategy. The switch to a new solution takes three months — three months with restricted financial bookkeeping.

Hardly any organisation today operates without external service providers. Cloud providers, IT service providers, payroll providers, hosting providers, software developers — dependence on third parties grows steadily. The BSI lists the failure or disruption of service providers as elementary threat G 0.11, and with 21 mapped ISO controls it is the most broadly addressed threat in this group.

What’s behind it?

When parts of your own service delivery depend on external providers, their availability becomes your own business risk. The organisation gives up part of the control — but retains full responsibility for the outcome.

Causes of failure

  • Insolvency — The provider ceases operations. Especially critical for cloud services and SaaS platforms where your own data resides on the provider’s infrastructure.
  • Unilateral contract termination — The provider terminates the contract with notice or demands conditions that are economically untenable. Switching to an alternative provider takes time.
  • Operational problems — Personnel absence, technical disruptions, cyber attacks or natural events at the provider impair its performance capability.
  • Quality deficiencies — Services delivered no longer meet the requirements. Gradual quality decline is often noticed only when a concrete incident occurs.
  • Subcontractor problems — Many providers rely on subcontractors. Their disruptions or failures cascade to the client indirectly — often without transparency about the subcontractor chain.

Bringing outsourced processes back in-house can be extremely laborious. Missing documentation, proprietary data formats, lack of cooperation from the outgoing provider and insufficient internal know-how hamper the transition. In the worst case, outsourced processes are effectively non-retrievable because internal knowledge has been lost over the years.

Impact

The failure of a service provider threatens all three protection goals simultaneously. Availability suffers through service loss. Confidentiality is at risk when an insolvent provider loses control over customer data or data reaches third parties. Integrity can be affected when quality deficiencies lead to faulty data processing.

Practical examples

Cloud provider with data loss. A company uses a cloud storage service for project management. The provider suffers a severe hardware failure and loses part of the stored data. Recovery takes weeks, and some data is permanently lost. The company had relied on the provider’s backup promises and had not created its own backup.

Outsourcing provider terminates the contract. An IT outsourcing provider terminates the contract with six months’ notice because the business is no longer economical for it. The outsourced systems have grown over years and are poorly documented. Bringing them back in-house requires know-how that is no longer available internally. The search for a successor provider and the transition take much longer than six months.

Quality deficiencies at the data-centre operator. A company houses its servers in an external data centre. The operator cuts back on air-conditioning maintenance. During a summer heat record, the undersized cooling fails. The company’s servers overheat and go down. The operator had no SLA commitment for air conditioning, and the company had never checked the data centre’s infrastructure since commissioning.

Relevant controls

The following ISO 27001 controls mitigate this threat. (You’ll find the complete list of 21 mapped controls below in the section ‘ISO 27001 Controls Covering This Threat’.)

Prevention:

Detection:

Response:

BSI IT-Grundschutz

G 0.11 is linked in the BSI IT-Grundschutz catalogue to the following modules:

  • OPS.2.3 (Use of outsourcing) — Requirements for managing outsourced IT services.
  • OPS.3.2 (Offering outsourcing) — Requirements for providers delivering outsourcing services.
  • OPS.2.2 (Cloud usage) — Specific requirements for the use of cloud services.
  • DER.4 (Emergency management) — Business-continuity planning that includes critical providers.

Sources

ISO 27001 Controls Covering This Threat

A.5.15 Access control A.5.19 Information security in supplier relationships A.5.20 Addressing information security within supplier agreements A.5.21 Managing information security in the ICT supply chain A.5.22 Monitoring, review and change management of supplier services A.5.23 Information security for use of cloud services A.5.24 Information security incident management planning and preparation A.5.25 Assessment and decision on information security events A.5.26 Response to information security incidents A.5.27 Learning from information security incidents A.5.29 Information security during disruption A.5.30 ICT readiness for business continuity A.6.7 Remote working A.8.1 User endpoint devices A.8.5 Secure authentication A.8.7 Protection against malware A.8.14 Redundancy of information processing facilities A.8.20 Networks security A.8.21 Security of network services A.8.22 Segregation of networks A.8.30 Outsourced development

Frequently asked questions

Which service providers are especially critical for information security?

All providers that have access to confidential data or whose failure stops business processes: cloud providers, data-centre operators, managed-service providers, development service providers, payroll providers, IT support. The harder and more time-consuming a provider switch would be, the more critical the dependency.

What is an exit strategy and do I need one?

An exit strategy describes how you can switch providers or bring the outsourced service back in-house — including data migration, transition periods, contract terms and technical prerequisites. Every critical provider should have a documented exit strategy. ISO 27001 requires this explicitly.

Do I have to audit my providers' information security?

Yes. ISO 27001 (controls A.5.19–A.5.22) requires that information security in the supply chain be addressed. That means: establishing security requirements contractually, reviewing them regularly (audits, reports, certifications) and reassessing them when things change. The depth depends on the criticality of the service.