AuditRubric
gv-sc-1 high Govern / Cybersecurity Supply Chain Risk Management

A cybersecurity supply chain risk management program is established

Your security is only as strong as your weakest vendor. Third-party software, SaaS tools, and service providers all have access to your data or systems, yet many organizations manage vendor risk informally or not at all. A supply chain risk management program gives you a consistent process for evaluating, onboarding, and monitoring vendors before their risks become your incidents.

Estimated effort: 8h
supply-chainthird-party-riskvendorsprocurementgovernance

Implementation steps

  1. 1

    Define the scope and objectives of your supply chain risk program

    Decide which types of suppliers fall under the program: software vendors, SaaS providers, cloud infrastructure, managed service providers, and contractors with system access. Write down what the program is trying to achieve: reducing the chance of a vendor-introduced breach, ensuring vendor compliance with your data handling requirements, and maintaining continuity if a vendor fails.

    confluencenotion
  2. 2

    Create a supplier inventory and risk classification scheme

    List all current suppliers that have access to your data or systems. Classify each by the sensitivity of what they can access: critical (data access or code execution in production), high (employee or customer data), medium (internal business data), low (no data access). The classification determines how much scrutiny each supplier receives.

    google-sheetsnotionservicenow
  3. 3

    Establish the program governance and assign an owner

    Name the person responsible for the supply chain risk program and define how vendor assessments are initiated, who reviews them, and who approves new vendors. Integrate the program into procurement so that no new vendor with system or data access can be onboarded without a security review.

    jiraservicenowconfluence

Evidence required

Supply chain risk management policy or program document

A written document defining the program scope, objectives, risk classification approach, and governance structure.

  • · Vendor risk management policy approved by CISO
  • · Third-party risk program charter document
  • · Procurement security requirements document

Supplier inventory with risk classifications

A current list of vendors with system or data access, classified by risk level.

  • · Vendor register spreadsheet with criticality column
  • · ServiceNow or similar GRC tool showing vendor records
  • · Procurement system with vendor security classification field

Related controls