The entity assesses and manages risks associated with vendors and business partners.
Points of focus:
- Establishes Requirements for Vendor and Business Partner Engagements
- Assesses Vendor and Business Partner Risks
- Assigns Responsibility and Accountability for Managing Vendors and Business Partners
- Establishes Communication Protocols for Vendors and Business Partners
- Establishes Exception Handling Procedures From Vendors and Business Partners
- Assesses Vendor and Business Partner Performance
- Implements Procedures for Addressing Issues Identified During Vendor and Business Partner Assessments
- Implements Procedures for Terminating Vendor and Business Partner Relationships
- Obtains Confidentiality Commitments from Vendors and Business Partners
- Assesses Compliance With Confidentiality Commitments of Vendors and Business Partners
- Obtains Privacy Commitments from Vendors and Business Partners
- Assesses Compliance with Privacy Commitments of Vendors and Business Partners
A supplier agreement will be drawn up with all partners directly or indirectly involved in the processing of data. The aim is to ensure that there is no misunderstanding between the organization and the supplier of parties' obligations regarding to complying with security requirements.
The organization shall include in the supplier agreement, as appropriate:
The organization has defined the certifications or standards required of key partners. Commonly recognized standards related to cyber security include:
Certifications required from partners can make organization's own partner management more efficient and provide good evidence of a particular level of security or privacy of the partner.
A responsible person has been appointed for the provider companies, who monitors the provider's activities, communications and compliance with the contract.
Responsible person must have sufficient skills to analyze cyber security requirements depending on the criticality of the provider. Responsible person also ensures that the provider appoints an own responsible person to ensure compliance with the contract and facilitate cooperation.
A designated responsible person actively monitors the supplier's activities and services to ensure compliance with the security terms of the contracts and the proper management of security incidents.
Monitoring includes the following:
The organization has defined the certifications or standards required of key partners. Commonly recognized standards related to cyber security include:
Certifications required from partners can make organization's own partner management more efficient and provide good evidence of a particular level of security or privacy of the partner.
The organization must obtain confidentiality commitments:
Furthermore, privacy commitments must be obtained:
the organization must assess:
The organization must take into account the risks caused by partners when managing information security risks. If necessary, separate theme-specific risk assessments can be made for critical partners.
The responsible person monitors significant changes in the supplier's operations that may affect the supplier relationship and service level, and thus require other measures. The following aspects are taken into account:
In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.