mirror of
https://github.com/strongdm/comply
synced 2024-11-25 17:14:53 +00:00
48 lines
3.1 KiB
Markdown
48 lines
3.1 KiB
Markdown
name: Vendor Management Policy
|
||
acronym: VMP
|
||
satisfies:
|
||
TSC:
|
||
- CC9.2
|
||
majorRevisions:
|
||
- date: Jun 1 2018
|
||
comment: Initial document
|
||
---
|
||
|
||
# Purpose and Scope
|
||
|
||
a. This policy defines the rules for relationships with the organization’s Information Technology (IT) vendors and partners.
|
||
|
||
a. This policy applies to all IT vendors and partners who have the ability to impact the confidentiality, integrity, and availability of the organization’s technology and sensitive information, or who are within the scope of the organization’s information security program.
|
||
|
||
a. This policy applies to all employees and contractors that are responsible for the management and oversight of IT vendors and partners of the organization.
|
||
|
||
# Background
|
||
|
||
a. The overall security of the organization is highly dependent on the security of its contractual relationships with its IT suppliers and partners. This policy defines requirements for effective management and oversight of such suppliers and partners from an information security perspective. The policy prescribes minimum standards a vendor must meet from an information security standpoint, including security clauses, risk assessments, service level agreements, and incident management.
|
||
|
||
# References
|
||
|
||
a. Information Security Policy
|
||
|
||
a. Security Incident Response Policy
|
||
|
||
# Policy
|
||
|
||
a. IT vendors are prohibited from accessing the organization’s information security assets until a contract containing security controls is agreed to and signed by the appropriate parties.
|
||
|
||
a. All IT vendors must comply with the security policies defined and derived from the Information Security Policy (reference (a)).
|
||
|
||
a. All security incidents by IT vendors or partners must be documented in accordance with the organization’s Security Incident Response Policy (reference (b)) and immediately forwarded to the Information Security Manager (ISM).
|
||
|
||
a. The organization must adhere to the terms of all Service Level Agreements (SLAs) entered into with IT vendors. As terms are updated, and as new ones are entered into, the organization must implement any changes or controls needed to ensure it remains in compliance.
|
||
|
||
a. Before entering into a contract and gaining access to the parent organization’s information systems, IT vendors must undergo a risk assessment.
|
||
|
||
i. Security risks related to IT vendors and partners must be identified during the risk assessment process.
|
||
|
||
i. The risk assessment must identify risks related to information and communication technology, as well as risks related to IT vendor supply chains, to include sub-suppliers.
|
||
|
||
a. IT vendors and partners must ensure that organizational records are protected, safeguarded, and disposed of securely. The organization strictly adheres to all applicable legal, regulatory and contractual requirements regarding the collection, processing, and transmission of sensitive data such as Personally-Identifiable Information (PII).
|
||
|
||
a. The organization may choose to audit IT vendors and partners to ensure compliance with applicable security policies, as well as legal, regulatory and contractual obligations.
|