Blue Screen of Death: Global CrowdStrike outage is a call to action
25 July 2024
25 July 2024
The outage is a call to action for all organisations to review essential risk management and readiness practices. Here are some key actions to consider.
If you were directly impacted conduct a post incident review that examines:
Whether or not you were directly impacted, understand and improve your resilience to similar outages in the future.
The scale and suddenness of this outage is now a "foreseeable risk." Even if your organisation was not directly impacted this time, regulators and customers expect all organisations to learn the lessons and adapt. In the article below, we explore 10 key legal and risk takeaways from the CrowdStrike outage.
A worldwide IT outage unfolded in the course of Thursday 18 and Friday 19 July 2024.
Cyber security company CrowdStrike released an update to Microsoft Windows that triggered a "logic error" resulting in a system crash that impacted computer networks worldwide, disrupting payment systems, banks, airports, hospitals, retailers, energy companies – many organisations that use both Windows and CrowdStrike saw at least some level of disruption.
The outage triggered meetings of various Government cyber and emergency management committees and warnings of the sudden rise in scammers and cyber criminals seeking to take advantage of the outage. Despite no long-term impact to critical infrastructure, speculation as to the costs of the incident is already well into the hundreds of millions of dollars, worldwide.
In the sections below we explore 10 key legal and risk takeaways from the CrowdStrike outage.
While we are still waiting for the complete picture, CrowdStrike has stated that the global outage was caused by a configuration update to Windows systems that use their security platform, Falcon. The configuration update triggered a "logic error", which resulted in servers and end points (laptops and desktops) crashing and failing to restart.
Compounding the impact for many was the use of BitLocker full-disk encryption, a sophisticated defence solution designed to prevent cyber threats, which also prevented users and IT teams from deploying the fix unless they had access to each endpoint’s unique BitLocker decryption key.
According to CrowdStrike, customers running the software who downloaded the update between 04.09 UTC and 5.27 UTC were susceptible to a crash.
This means that a simple update to a piece of code that was in release for a total of 78 minutes, caused a global outage that reportedly impacted 8.5 million devices worldwide.
While the scale of incident from a seemingly minor change may seem surprising, this outage aligns with two of Ashurst's key observations from cyber post incident reviews:
There is a raft of new regulations aimed at strengthening operational resilience specifically aimed at preventing and responding to disruptions such as the CrowdStrike outage to minimise harm to customers.
The new legislation such as CPS 230 Operational Risk Management in Australia and DORA in the UK will lift the bar on the management of third parties and introduce better practice that will require organisations to adopt a risk-based approach.
Better practice also requires an organisation to look through to the processes, risks and controls of the service provider to deliver the services the organisation relies on to provide critical operations to customers. This reinforces the principle that an entity may outsource the activity, but not the risk or accountability.
Greater visibility will then be required of material service provider risk frameworks and their capability to manage risk to prevent such incidents. In particular, the CrowdStrike outage reminds us of the importance of understanding what best practice change management and patching looks like, and ensuring that organisations set clear expectations with material service providers on the level of testing required before patching.
It is recognised this visibility is harder to obtain with large global players such as Microsoft where entities have limited leverage to influence them to provide information over risk management practices. New regulation currently under consultation in the UK aims to designate critical third parties (CTPs) and bring them under the supervisory remit of financial regulators, similar to European Supervisory Authorities powers under DORA.
Even with visibility, there is no guarantee that you will be able to prevent significant incidents – you also need to be confident in your own capability to respond with appropriate contingency and continuity planning, including identifying back-up or substitute systems, processes, and service providers.
While an incident may not be your fault, customers and regulators expect you to be able to adequately respond. Regulators across the world increasingly expect organisations to demonstrate greater levels of sophistication and maturity in incident and crisis management response. Following an incident, regulators are "marking" a company's response in relation to the effectiveness of existing plans and processes. The benchmark is to have "thorough and comprehensive planning" for significant incidents.
Ashurst has defined ten core elements to assessing readiness maturity.
When we assess readiness with our clients, we are looking at two key measures: Capability and Confidence. Capability refers to documents, plans, and processes. Confidence refers to how effective people and teams are at execution, implementation and decision making. Measuring your confidence and capability across these ten core readiness elements is likely to demonstrate thorough and comprehensive planning.
Post incident reviews are an important tool in improving operational resilience and regulators will be keen to understand and share lessons learned. As part of your post incident review, understand how your organisation navigated the CrowdStrike incident, and where it could do better.
It’s also important to understand data impacts as part of your operational resilience.
Business disruption incidents can require regulator notifications under a range of regimes, including critical infrastructure laws, sector-specific regulation (such as in the financial sector), continuous disclosure obligations for corporations, and data protection and privacy regimes. Despite efforts to align, simplify and streamline notifications, different regimes can have quite different requirements – and business continuity and operational resilience planning need to take them into account.
To meet regulator expectations, organisations need to:
While system outages are often viewed as a business continuity risk rather than a data protection or privacy breach, it should be noted that a loss of availability of personal data within the UK and EU falls within the definition of a data breach and can require notification to regulators if it presents a risk to individuals. Contrast this with Australia where although the definition is narrower (in that for a data breach to have occurred there must be unauthorised use or disclosure) the privacy regulator has taken the view that evidence that data has been stolen is not necessary for a data breach to have occurred.
Following the CrowdStrike incident, expect both suppliers and customers to take a closer look at contractual, liability and insurance implications (and exposures) to minimise business interruption risk, mitigate impacts, and clarify consequences of outages.
Key issues to consider include the following.
Exclusions and limitations of responsibility and liability allow technology suppliers to control business risk - this will be top of mind for suppliers following the CrowdStrike outage. Suppliers may be reluctant to take on additional business risk, particularly if their upstream suppliers do not take on additional risk. Negotiations depend on a strong understanding of how risks can be mitigated and controlled in practice, how various insurance policies may respond, and commercial leverage. Adopting a proportionate approach to cyber clauses is advisable. Not all third parties will create the same risk exposure for you – tiering those suppliers, informed by mapping third parties to critical process/important business services, is vital.
Organisations should review their cyber business interruption insurance both for cover for losses because of the CrowdStrike incident and for the adequacy of cover for potential future events. Issues to consider include:
The adequacy of liability cover under cyber, professional indemnity and errors and omissions policies should also be reviewed.
Where there are actual or potential insured losses or liabilities because of the CrowdStrike incident, organisations should ensure that they follow the notification requirements in their policies.
In the aftermath of the CrowdStrike outage, organisations and customers directly or indirectly impacted by the incident will be counting their losses and looking carefully at their contracts and insurance arrangements to understand how they might be able to recover some of their losses.
Increasingly, organisations rely on a small number of large, cloud-based services as critical parts of supply chains. In many cases, these “linchpin” services are contracted indirectly through service providers – which can limit the visibility of critical systems and services, and the terms on which they are provided.
Standard terms of service of large platforms will often significantly limit liability, particularly for loss to an organisation’s customers. Amounts recoverable may be limited to service level credits, or a reduction of fees paid, and insurance will be unlikely to cover all losses.
In this environment, organisations may look to recover against other entities in the supply chain who have been unable to deliver on their obligations due to the CrowdStrike outage.
Whether or not you have been impacted, the CrowdStrike outage is a reminder to understand exactly how liability, responsibility and risk is allocated within supply chains – does your “downstream” liability to customers align with what you can expect to recover from your “upstream” supplier contracts?
If your organisation has been directly or indirectly impacted by the incident:
The CrowdStrike outage is a call to action in an economy increasingly dominated by highly interdependent and interconnected digital supply chains – bringing a particular focus on the role that third (or fourth) party suppliers and technologies can play in supporting critical business operations.
In the short term, those impacted need to assess the impacts of the outage, make sure they have complied with notification, remediation and other obligations they may have under legislation or contracts, and anticipate ongoing risks arising from the outage – which may include the possibility of regulatory intervention or supply chain disputes.
Importantly, post incident review processes can help prepare for or avoid the impacts of future outages.
Whether or not you were impacted, inaction is not an option. All organisations are expected to learn and adapt.
In a changing world, our vision at Ashurst is to be a highly progressive global law firm. For over 200 years we have advised corporates, financial institutions and governments on their most complex transactions, disputes and projects. We offer the reach and insight of a global network, combined with our knowledge and understanding of local markets. At Ashurst, we help our clients build cyber resilience and effective cyber risk management through a combination of legal, risk advisory and programme delivery teams. We provide end-to-end, whole-of-life-cycle expertise across cyber, data and privacy issues. Having advised on some of Australia’s most high-profile cyber incidents, we have unique insights and expertise that can improve how organisations prepare for and respond to high-impact cyber incidents, at executive and Board level.
Read more about our cybersecurity services.
Authors: John Macpherson, Partner, Risk Advisory; Niki Short, Partner, Risk Advisory; Rhiannon Webster, Partner; Rehana Box, Partner; Nicholas Mavrakis, Partner; Andrew Hilton, Expertise Counsel; Tharaka Boralessa, Director, Risk Advisory; Christopher Bates, Partner; Anthony Lloyd, Partner and Matthew Worsfold, Partner, Risk Advisory.
Understand how you need to manage cyber security risk in light of the new Australian laws and heightened regulator expectations
How to prepareThis publication is a joint publication from Ashurst LLP, Ashurst Australia, Ashurst Risk Advisory LLP and Ashurst Risk Advisory Pty Ltd, which are all part of the Ashurst Group.
The Ashurst Group comprises Ashurst LLP, Ashurst Australia and their respective affiliates (including independent local partnerships, companies or other entities) which are authorised to use the name "Ashurst" or describe themselves as being affiliated with Ashurst. Some members of the Ashurst Group are limited liability entities.
Ashurst Risk Advisory LLP is a limited liability partnership registered in England and Wales under number OC442883 and is part of the Ashurst Group . Ashurst Risk Advisory LLP services do not constitute legal services or legal advice, and are not provided by qualified legal practitioners acting in that capacity. Ashurst Risk Advisory LLP is not regulated by the Solicitors Regulation Authority of England and Wales. The laws and regulations which govern the provision of legal services in other jurisdictions do not apply to the provision of risk advisory services.
Ashurst Risk Advisory Pty Ltd is proprietary company registered in Australia, and trading under ABN 74 996 309 133.
Ashurst Risk Advisory LLP and Ashurst Risk Advisory Pty Ltd services do not constitute legal services or legal advice and are not provided by qualified legal practitioners acting in that capacity. The laws and regulations which govern the provision of legal services in the relevant jurisdiction do not apply to the provision of risk advisory (non-legal) services.
For more information about the Ashurst Group, which Ashurst Group entity operates in a particular country and the services offered, please visit www.ashurst.com