Third-Party Management

Edited

The primary objective behind this activity set is to help maintain the security of organization's information systems and data when entering into any arrangement with a third-party supplier/vendor as well as to identify elements of managing vendors, due diligence, risk assessments as well as contract management. 

Category

Sub-Category

Name

Activity

Third Party Management

Vendor Assessments

Third Party Assurance
Review

[In accordance with the organization-defined frequency], management reviews controls within third party assurance reports to ensure that they meet ensure that they meet organizational requirements; if control gaps are identified in the assurance reports, management takes action to address impact the disclosed gaps have on the organization.

Third Party Management

Vendor Assessments

Vendor Risk Management

[The organization] performs a risk assessment to determine the data types that can be shared with a managed service provider.

Third Party Management

Vendor Assessments

Forensic Investigations

[The organization] enables procedures to conduct a forensic investigation in the event that a hosted merchant or service provider is compromised.

Third Party Management

Vendor Agreements

Network Access
Agreement:
Vendors

Third party entities which gain access to [the organization's] network sign a network access agreement.

Third Party Management

Vendor Agreements

Vendor Non- disclosure Agreements

[Workforce personnel as defined by the organization] consent to a non-disclosure clause.

Third Party Management

Vendor Agreements

Cardholder Data Security Agreement

[The organization] managed service providers that manage, store, or transmit cardholder data on behalf of the customer must provide written acknowledgement to customers of their responsibility to protect cardholder data and the cardholder data environment.

Third Party Management

Vendor Agreements

Network Service
Level Agreements
(SLA)

Vendors providing networking services to [the organization] are contractually bound to provide secure and available services as documented in SLAs.

Third Party Management

Vendor Procurement

Approved Service Provider Listing

[The organization] maintains a list of approved managed service providers and the services they provide to [the organization].

Third Party Management

Vendor Agreements

HIPAA Business Associate Subcontractor Agreement

[The organization] requires a Business Associate Subcontractor Agreement with Business Associates from which it receives or transmits protected health information (PHI); Business Associates under contract are required to provide assurance that they adhere to [the organization] security standards, which includes the security of PHI and reporting security events that potentially expose PHI.

Third Party Management

Vendor Agreements

Vendor Information Security Standard

[The organization] has documented a Vendor Information Security Standard that defines the responsibilities and governance requirements regarding vendor information security engagements. Contractual agreements are entered into with vendors who process or store [The organization's] data that define information Security terms and service level agreements.