10: 3 Supply Chain Risk Flashcards
Vendor Security Policy Minimum
ensure that vendors policies are at least as stringent as your own
Vendor Management Lifecycle (1)
Vendor Selection - May use Request for Proposals, or an informal process. Assess provider’s risk management program.
Vendor Management Lifecycle (2)
Onboarding - Verify contract details, arrange secure data transfer, establish incident procedures
Vendor Management Lifecycle (3)
Monitoring - Conduct site visits, review independent audits, handle security audits
Vendor Management Lifecycle (4)
Offboarding - Destroy confidential information, unwind a business relationship gracefully
NDAs
Non-disclosure agreement
SLR
Service Level Requirements, document specific requirements customer has about any aspect of the vendor (i.e. system response time)
SLA
Service Level Agreement - describes condition of service and any penalties
MOU
Memorandum of Understanding - letter written to document aspect of relationship (often can be within same organization)
BPA
Business Partnership Agreement (Responsibilties, division of profits
ISA
Interconnection Security Agreement - standards used
MSA
Master Services Agreement - Includes all key terms used to govern relationship
SOW
Statement of Work - for an individual project, governed by MSA
Data Ownership Language
Customer Retains ownership, vendor right to use info is limited, agreements should limit data sharing with third parties
Data protection provisions
important if vendor will be sole custodian of information