Critical suppliers are assessed prior to acquisition
Bringing a new critical supplier into your environment is a risk event that deserves the same scrutiny you would apply to any significant architectural decision. A supplier with weak security practices can become your breach vector. Assessing them before signing means you negotiate from a position of information rather than discovering problems after you are already dependent on them.
Implementation steps
- 1
Define which suppliers require pre-acquisition assessment
Not every vendor needs a full security assessment before you sign up. Define the threshold: any vendor with access to customer data, any vendor with production system access, any vendor providing security-critical services, and any vendor processing payment data. Below that threshold, a lighter review (DPA review and basic questionnaire) is sufficient.
- 2
Conduct pre-acquisition security assessments
For suppliers meeting the threshold, send a security questionnaire covering: access controls, encryption practices, vulnerability management, incident response, data retention and deletion, and third-party assessments they have undergone. For critical suppliers, request a recent SOC 2 Type II report, ISO 27001 certificate, or equivalent. Review responses critically, not just for completeness.
whisticpanoraysonetrustservicenow - 3
Make the assessment outcome a condition of procurement approval
Security assessment results should be a required input to procurement decisions for in-scope suppliers. A failing assessment can result in: rejection of the vendor, requirement to remediate specific gaps before contract signing, or acceptance with documented compensating controls and risk sign-off by the appropriate authority.
jiraservicenow
Evidence required
Pre-acquisition vendor security assessments
Completed security assessments for suppliers in scope, conducted before contracts were signed.
- · Completed vendor security questionnaire with date prior to contract signing
- · SOC 2 or ISO 27001 report review for a critical vendor pre-contract
- · Vendor security assessment approval record in the procurement workflow
Assessment outcome integrated into procurement decisions
Records showing that assessment outcomes influenced the procurement decision, not just that assessments were filed.
- · Procurement approval showing security sign-off as a required field
- · Vendor rejection or conditional approval based on assessment findings
- · Risk acceptance memo for a vendor approved despite open findings
Related controls
Due diligence is performed before entering into supplier relationships
Cybersecurity Supply Chain Risk Management
A cybersecurity supply chain risk management program is established
Cybersecurity Supply Chain Risk Management
The authenticity and integrity of hardware and software are assessed prior to acquisition and use
Risk Assessment
Suppliers are known and prioritized by criticality
Cybersecurity Supply Chain Risk Management