The ITAM Review

News, reviews and resources for worldwide ITAM, SAM and Licensing professionals.

Ticketmaster data breach – “it wasn’t me”

The recent Ticketmaster breach is perhaps the first large-scale breach in our brave new GDPR-regulated world, and it warrants further analysis. As the dust has settled each party has spun the story in a different way, and there has been far more public disclosure of exactly what happened compared to previous large-scale breaches.

So, who are the players and what have they said?

Monzo, a UK-based banking startup and credit-card issuer first reported the breach to Ticketmaster.

Ticketmaster are the largest seller of entertainment & sports tickets worldwide. They have pointed the finger of blame at a third-party supplier, Inbenta, who provide them with automated customer support services.

Inbenta have released a statement outlining that custom code, created at Ticketmaster’s request, was used on a payments page, which it wasn’t designed for.

Ticketmaster’s statement lays the blame firmly at the door of Inbenta, with no mention of Inbenta’s assertion that the code was created at Ticketmaster’s request, or that it was used, without Inbenta’s knowledge, on the payment page.

Monzo have provided a very detailed statement on how they discovered the breach and persuaded Ticketmaster that it was real, despite Ticketmaster flatly denying there was an issue.

Out of the three companies their conduct has been the most customer-focused – they immediately and unilaterally reissued 6,000 replacement credit cards. Subsequently, following card issuer Mastercard’s “Account Data Compromise Alert”, they’ve replaced all potentially affected cards.

These differing statements are the public face of the increasingly-important requirement for Third Party Supplier Risk Management.

Third Party Supplier Risk Management

Stated simply and from an IT Security & Compliance perspective, third-party supplier risk management is concerned with measuring and controlling risk associated with using a 3rd party to provide services to customers. In this case, Ticketmaster provided access to their systems to Inbenta in order to provide Ticketmaster customers with customer support services.

This 3rd party access needs to be controlled in order to provide to the customer the same level of data protection they would have enjoyed had the 3rd party not been involved. Typically the required level of protection is defined by laws and regulations such as GPDR & PCI-DSS. The latter regulation has highly detailed and mature requirements for protecting card data and is therefore particularly relevant to this breach.

The SAM angle – code vulnerability reporting

Often, SAM functions tend to focus solely on managing proprietary software from major vendors. Strictly speaking, however, in-house production final code should be stored in the Definitive Media Library, as per the ITIL Configuration and Release Management standard, and therefore be in the remit of a SAM team. In conjunction with other functions there is also a case to state that bespoke code should be included in a software inventory, thereby enabling a SAM team to identify where potentially-compromised code is installed. A SAM Manager’s most important stakeholder in this scenario is the IT Security & Compliance Team as they will have the tools to identify code vulnerabilities. However, there is some movement in the SAM tools market with players such as Snow including vulnerability reporting in their products. In Snow’s case this data comes direct from the industry-standard NIST vulnerability database. Flexera also provide vulnerability reporting, and Matrix42 recently acquired EgoSecure to strengthen their offering in this area.

Conclusion

Due to the nature of this breach it is unlikely that even a fully-integrated SAM & IT Security team would have spotted it. However, as applications increasingly rely on 3rd party code and Open Source libraries there is an opportunity for the SAM team to provide additional value and raise their profile beyond being “those IT people who manage our Microsoft agreement”. As the GDPR-initiated compliance journey continues over the coming years there are likely to be more of these opportunities for SAM Managers, alongside other role changes such as SaaS Subscription Management.

About AJ Witt

A former IT Asset Manager, AJ is Industry Analyst for The ITAM Review. He's interested in hearing from end users of ITAM tools and also vendors. He enjoys writing about the SaaS Management market, practical aspects of ITAM operations, and the strategy of major software publishers. You can connect via email (aj.witt@itassetmanagement.net) or LinkedIn. AJ is based in the New Forest where he enjoys cycling, walking, spending time with his family, and keeping chickens

2 Comments

  1. STEVE CROPPER says:

    Great article Martin. As we have discussed in the past, the is more to Software Asset Management than cost reducing an existing know (or usually not so well known) landscape of commercial software. Businesses need to be more attentive to the real costs of not managing their complete software landscape effectively and that includes homes grown, bespoke developed and open source.

    Not doing this will lead to some more interesting cases being presented as a side effect of the GDPR regulation and EU coffers being richly lined as a result. Key to this example case is the lack of clarity over who has what responsibility. A well coordinated, and funded, SAM strategy and practise would resolve this quickly.

  2. AJ Witt says:

    Over two years on and the ICO have fined Ticketmaster just £1.25m – or approximately £1 per UK customer who had their personal data exposed in this hack. Despite that, they’re going to appeal against the ruling! Interesting to note that there are civil cases for damages also going through the courts at the moment.

Leave a Comment