Posted on May 4, 2020
Vendor risk management becomes more important every year. Increasingly, enterprise IT incorporates a complex, interconnected system of cloud-based storage and application resources. Leveraging the cloud’s speed and volume to reduce operational overhead increases compliance risk in equal measure. As companies add more vendors to their IT ecosystem, they need to ensure that they verify vendors’ security controls. Most organizations take a three-pronged approach to security. After identifying risks, they incorporate technology and processes to help people protect data security. Although “knowing is half the battle,” knowing the right questions to ask is the other half which is why we’re offering a vendor risk management questionnaire template to help you.
The first step to creating an actionable questionnaire is identifying risks so that you can analyze them. In many ways, this identification process is similar to the one you do for yourself. At the core, you want to ensure that your vendors are applying the right controls to nonpublic personally identifiable information (PII) to protect the information that you share with them.
Do you collect, store, or transmit personally identifiable information (PII)?
Do you limit your PII collection and storage?
Do you store PII in an on-premises location?
Do you store PII in a cloud location?
What geographic locations do you use when storing PII?
How do you provide users access to PII?
Can users access PII remotely?
What types of devices do your users collect, store, or transmit PII from?
Do you monitor all devices connected to systems, software, and networks?
Do you need to comply with any governmental regulations? (Please list regulations in comments)
Do you have any industry standards certifications? (Please list certifications in the comments section)
Your organization determines its own risk tolerance. In other words, your organization knows the risks that you are willing to accept, reject, transfer, or mitigate. As part of creating a vendor risk management questionnaire, you need to ensure that your third-party business partners have a risk tolerance that aligns with yours.
Do you use a firewall?
Do you use a VPN?
Do you encrypt data-at-rest and in-transit? (Describe encryption level in comments)
Do you use TLS and SSH certificates to ensure data exchanges are secure?
Do you install antimalware and antiransomware on all devices?
Do you monitor for DDoS attacks?
Do you protect against spoofing of email servers?
Do you install security patches for systems, networks, and software? (Explain timeline in comments)
Do you retire “end of life” products? (Explain process in comments)
Do you install antimalware and antivirus on all devices connected to your networks?
Do you secure web applications from SQL injection and cross-site scripting attacks? (Explain further in comments)
A mature organization establishes both written policies and a series of processes for maintaining a secure IT environment.
Do you continuously monitor your controls to prevent cyber attacks? (Describe in comments)
Vendor Risk Management
Do you have a vendor risk management program?
Vendor Risk Management
Do you have clauses in your service level agreements about vendor cyber security? (List relevant clauses in comments)
Vendor Risk Management
Do you monitor your vendors’ cybersecurity? (Explain process in comments)
Do you have an incident response team?
Have you tested your incident response processes?
Do you have a business continuity plan? (Explain further in comments)
Do you incorporate DDoS and other cyber attacks as part of your business continuity plan?
Do you have a process to remediate new risks? (Explain further in comments)
Have you had an IT audit in the last 12 months? (List any findings in comments)
Have you had a penetration test in the last 12 months? (List any findings in comments)
Do you have a password policy? (List password requirements in comments)
Do you require multi-factor authentication?
Do you limit access according to the principle of least privilege?
Do you require workforce members to take a phishing training annually? (Provide documentation of completion)
Do you require annual workforce security training? (Provide documentation of completion)
Requesting information from vendors and providing questionnaires acts as the first step to a mature vendor risk management program. Our security ratings platform enables organizations to continuously monitor their vendor ecosystem across ten risk factors, including IP reputation, network security, DNS health, web application security, endpoint security, hacker chatter, leaked credentials, and patching cadence.
In addition, SecurityScorecard's Atlas, makes the entire questionnaire management process easier and more efficient. Atlas aligns questionnaire responses with SecurityScorecard Ratings, providing an instant 360° view of cybersecurity risk and automatic validation of responses, enabling companies to objectively pinpoint risk.
Check out our list of 3 top third party risk management (TPRM) challenges, and the actions you can take to bolster your program. Learn more.
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Read our guide.
Templates and vendor evaluations are needed to level that playing field, in a time efficient and fair way, so that the best vendors are chosen.
Co-founder and CEO, Alex Yampolskiy, speaks about the importance of measuring and acting on key indicators of cybersecurity risk.
You’ve invested in cybersecurity, but are you tracking your efforts? Check out our list of 20 cybersecurity KPIs you should track. Read more.
No waiting, 100% Free
Get your free scorecard and learn how you stack up across 10 risk categories. Answer a few simple questions and we'll instantly send your score to your business email.