Any Laws Against Hiring Foreign Virtual Workers For Cyber Security

Hi all. I was trying to find out if anybody knew of any laws that disallows foreign virtual workers (e.g. from Brazil, Kenya, Africa, etc) from performing cyber security audits or risk assessments for businesses here in the U.S.? This thought struck me as their is a well-known shortage for qualified cyber security workers here in the U.S. At the same time their also exists a stable virtual ecosystem for qualified remote workers in foreign countries who are willing to work for cheaper hourly rates.
I of course, just know about the arbitrage situation. I know less about the associated laws that hiring companies have to abide by. Thanks in advance for sharing your knowledge, comments, etc.
I of course, just know about the arbitrage situation. I know less about the associated laws that hiring companies have to abide by. Thanks in advance for sharing your knowledge, comments, etc.
B.Sc (Info. Systems), CISSP, CCNA, CCNP, Security+
Comments
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
Thanks for chipping in @bigdogz . What I'm referring to specifically is the standard interview between auditor and security manager to answer (yes) or (no) to questions on a checklist. There are no technology interventions at this level just a human being interviewing another human being in a Zoom session to complete an audit or security assessment questionnaire.
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
We're of the same train of thought UnixGuy. It's strictly the questionnaire type security assessments. E.g. 1) Do you have a firewall in place (yes/no), Do you use 2-factor authentication for this resource (yes/no), Do you enforce password change every 90 days (yes/no).
So with this kind of assessment no data is being viewed. I just wanted to be absolutely sure that there was no dominating legal barrier to prevent overseas workers (e.g. from Philipinnes) from conducting such interviews with small business owners in the US. There is certainly a benefit as these businesses can become compliant and avoid penalties.
Have you check with any actual legal professionals who specialize in this sort of thing?
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
@JDMurray ....yeah, I've been knocking on the legal doors. I asked a couple of lawyer friends of mine, plus engaged some legal forums. It's the same pattern as here. The default thought is that the foreign contractors would be accessing confidential data. However that's not the case of course. The type of work I'm seeking to validate is simply of the _checklist_ risk assessment variety.
@fitzlopez thanks for the insight. So obviously the risk assessment projects that might be the best candidate for this outsourcing are the high-volume, low-risk variety. I'm not saying each project does not deserve detail of course, but as you mentioned, if the cheap guy checks the wrong box the worse case scenario is one that you can digest financially.
Don't automatically assume so. If your risk assessment uncovers critical vulnerabilities to your network, would you want someone outside the country have that information? So you database server is still running Windows NT, but with your tight budget you haven't gotten around to replace it yet? This kind of information would be of value on the dark web. While it might be legal to hire this person, would you want to? What is the motivation hiring a foreign worker anyway? To save a few bucks? Or do they have some kind of expertise your looking for?
Firewall = Check
IDS/IPS = No
WAF = No
Security Hardening/Patching = Negligible
Encryption = Supporting TLS 1.0/1.1.
SIEM/Logging = Negligible
SDLC = No validation of input/encoding output.
You get where I'm going with this right? Aggregating the information poses massive problems especially if the information is in the wrong hands. Be careful. Understand your scope, what will be asked, what information is divulged and take it from there.
@TechGromit the reason is basically both for expertise as well as to save a few bucks. A few years before security I worked for a large tech enterprise. Six months into the engagement they moved that entire project to foreign workers. The workers had the sensitive permissions like resetting passwords and assigning permissions to users. I guess it makes sense trying to see if such a situation is possible in InfoSec as well as long within authorized boundaries.
I think its a balancing act between protecting what you find and ensuring it adds value by having appropriate remediation measures in place. Even with the IDS example you mentioned, internal audit reports with anything deemed sensitive are never shared outside. It is always classified based on need to know depending on its sensitivity.
Ultimately, you want to be doing business with someone where you have assurance that they not only can do the work but also can protect key findings. Imagine if this stuff was internet facing and not protected - so agree around the legalities but I think aggregated data is more of a concern than individual findings etc.
2020: GCIP | GCIA
2021: GRID | GDSA | Pentest+
2022: GMON | GDAT
2023: GREM | GSE | GCFA
WGU BS IT-NA | SANS Grad Cert: PT&EH | SANS Grad Cert: ICS Security | SANS Grad Cert: Cyber Defense Ops | SANS Grad Cert: Incident Response
@UnixGuy, we are whole-heartedly of the same thought process.