ISO IEC 27002 2013 Information Security Audit Tool

Transcription

ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL15. SUPPLIER RELATIONSHIP MANAGEMENT AUDIT15.1 ESTABLISH SECURITY AGREEMENTS WITH SUPPLIERS15.1.1 EXPECT SUPPLIERS TO COMPLY WITH RISK MITIGATION AGREEMENTSDo you clarify the information security risks that exist wheneveryour suppliers have access to your organization’s assets?CTRLYNXYNXYNXYNXYNXDo you use your supplier access policy to document your access controls?YNXDo you establish control by developing processes and procedures?YNXGUIDEDo you develop processes and procedures that you must apply?YNXGUIDEDo you develop processes and procedures that suppliers must use?YNXYNXDid you identify the types of suppliers that will be allowed to have access?YNXDid you describe the information that each type of supplier may access?YNXYNXDid you define security requirements for each type of information?YNXDid you specify access controls for each type of information?YNXYNXYNXYNXYNXYNXDo you clarify your risk mitigation requirements and the risk mitigationexpectations that your organization’s suppliers must comply with?CTRLDo you establish security risk mitigation agreements with suppliers?CTRLDo you document your security risk mitigation agreements?CTRLGUIDEDid you establish a policy to control supplier access to your information?GUIDEGUIDEGUIDEDid you establish controls to restrict supplier access to your information?GUIDEGUIDEDid you describe specific access controls for each type of supplier?GUIDEGUIDEGUIDEDid you describe monitoring methods for each type of supplier?GUIDEGUIDEDo you create information accuracy and completeness controls?Do you use your controls to ensure the integrity of information?GUIDEDo you use them to ensure the integrity of information processing?GUIDEGUIDEDo you clarify suppliers’ information security duties and obligations?ORGANIZATION:YOUR LOCATION:COMPLETED BY:DATE COMPLETED:REVIEWED BY:DATE REVIEWED:APR 2014PLAIN ENGLISH INFORMATION SECURITY AUDIT TOOLPART 15COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED.EDITION 1.0PAGE 121

ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL15. SUPPLIER RELATIONSHIP MANAGEMENT AUDITGUIDEDid you develop a typical supplier relationship management process?YNXYNXYNXYNXDo you consider the type of information each supplier may access?YNXDo you consider your unique risk profile and business needs?YNXDo you define access controls for each type of information?YNXDo you describe how transitions should be managed and controlled?YNXGUIDEDo you clarify how information will be moved safely and securely?YNXGUIDEDo you clarify how information processing facilities are protected?YNXYNXDo you allocate responsibilities to both you and your suppliers?YNXDo you clarify your resilience and recovery needs and requirements?YNXDo you clarify your suppliers’ resilience and recovery obligations?YNXDo you establish joint resilience and recovery arrangements?YNXYNXDo you monitor compliance with information security requirements?YNXDid you establish supplier monitoring processes and procedures?YNXDid you develop a typical supplier relationship management lifecycle?GUIDEGUIDEDo you prepare information security agreements for each supplier (15.1.2)?Do you define your minimum information security requirements?GUIDEGUIDEGUIDEGUIDEGUIDEDo you assign responsibility for handling information security incidents?GUIDEGUIDEGUIDEGUIDEGUIDEDo you document all information security requirements and controls?GUIDEGUIDEGUIDEGUIDEDid you establish processes and procedures for each type of supplier?YNXGUIDEDid you establish processes and procedures for each type of access?YNXDo you review compliance with information security requirements?YNXGUIDEDid you establish third party review processes and procedures?YNXGUIDEDid you establish product validation processes and procedures?YNXGUIDEORGANIZATION:YOUR LOCATION:COMPLETED BY:DATE COMPLETED:REVIEWED BY:DATE REVIEWED:APR 2014PLAIN ENGLISH INFORMATION SECURITY AUDIT TOOLPART 15COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED.EDITION 1.0PAGE 122

ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL15. SUPPLIER RELATIONSHIP MANAGEMENT AUDITDid you establish an awareness program to talk about supplier security?YNXDo you make your personnel aware of your supplier access controls?YNXGUIDEDo you teach buyers about your policies, processes and procedures?YNXGUIDEDo you explain how your personnel should interact with suppliers?YNXGUIDEGUIDEGUIDEDo you distinguish between types of suppliers and types of access?YNXGUIDEDo you clarify the access that suppliers may be allowed to have?YNXYNX15.1.2 EXPECT SUPPLIERS TO COMPLY WITH INFORMATION SECURITY AGREEMENTSCTRLHave you identified all of the information securityrequirements that you expect suppliers to comply with?CTRLDo you clarify information security requirements wheneversuppliers must access your organization’s information?YNXCTRLDo you clarify information security requirements wheneversuppliers must process your organization’s information?YNXCTRLDo you clarify information security requirements wheneversuppliers must store your organization’s information?YNXCTRLDo you clarify information security requirements whenever suppliersmust communicate using your organization’s information?YNXCTRLDo you clarify information security requirements wheneveryour suppliers must provide IT infrastructure components?YNXHave you established information security agreements with each supplier?YNXDid you develop information security agreements for each supplier?YNXCTRLGUIDEGUIDEDo you describe relevant information security policies for each contract?YNXGUIDEDo you describe the type of information that may be provided or accessed?YNXGUIDEDo you describe the methods that may be used to provide information?YNXGUIDEDo you describe the methods that may be used to access information?YNXORGANIZATION:YOUR LOCATION:COMPLETED BY:DATE COMPLETED:REVIEWED BY:DATE REVIEWED:APR 2014PLAIN ENGLISH INFORMATION SECURITY AUDIT TOOLPART 15COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED.EDITION 1.0PAGE 123

ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL15. SUPPLIER RELATIONSHIP MANAGEMENT AUDITGUIDEDo you describe the information classification scheme that will be used?YNXDo you map your organization’s scheme (8.2) against each supplier’s?YNXYNXYNXGUIDEGUIDEDo you describe all relevant legal and regulatory requirements?Do you explain how legal and regulatory requirements must be met?GUIDEGUIDEDo you describe data protection obligations and requirements?YNXGUIDEDo you describe intellectual property rights and requirements?YNXYNXYNXGUIDEDo you describe the controls that each party must implement?Do you describe the access controls that must be established?GUIDEGUIDEDo you describe acceptable and unacceptable uses of information?YNXGUIDEDo you describe how appropriate supplier personnel will be selected?YNXDo you specify personnel screening requirements and responsibilities?YNXDo you establish notification procedures that screeners must use?YNXGUIDEGUIDEGUIDEDo you ask suppliers to notify you if they uncover security issues?YNXGUIDEDo you ask suppliers to notify you if they fail to screen personnel?YNXDo you describe how authorized persons will be assigned and removed?YNXYNXGUIDEDo you describe how and when access authorizations will be assigned?GUIDEGUIDEDo you consider creating explicit lists of authorized personnel?YNXGUIDEDo you consider establishing supplier authorization procedures?YNXGUIDEDo you consider defining supplier authorization conditions?YNXDo you describe how and why access authorizations would be revoked?YNXDo you describe rules to control the use of subcontractors by suppliers?YNXGUIDEGUIDEORGANIZATION:YOUR LOCATION:COMPLETED BY:DATE COMPLETED:REVIEWED BY:DATE REVIEWED:APR 2014PLAIN ENGLISH INFORMATION SECURITY AUDIT TOOLPART 15COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED.EDITION 1.0PAGE 124

ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL15. SUPPLIER RELATIONSHIP MANAGEMENT AUDITGUIDEDo you describe controls suppliers must use to manage subcontractors?YNXYNXDo you describe your organization’s incident management procedures?YNXDo you describe your notification and collaboration procedures?YNXYNXYNXDo you describe your organization’s incident management requirements?GUIDEGUIDEGUIDEGUIDEDo you explain how people will work together if incidents occur?Do you describe your security training and awareness requirements?GUIDEGUIDEDo you expect suppliers to explain incident response procedures?YNXGUIDEDo you expect suppliers to explain access authorization procedures?YNXDo you describe how you plan to communicate with each supplier?YNXDo you identify contacts for each information security agreement?YNXGUIDEGUIDEGUIDEDo you describe how you plan to monitor supplier performance?YNXGUIDEDo you describe your right to audit suppliers’ processes and controls?YNXYNXGUIDEDo you describe the supplier audits that you plan to carry out?GUIDEDo you describe how you plan to review the performance of suppliers?YNXGUIDEDo you describe suppliers’ reporting obligations and responsibilities?YNXDo you ask suppliers to submit regular independent security reports?YNXGUIDEDo you ask suppliers to report on the effectiveness of their controls?YNXGUIDEDo you ask suppliers to explain how security issues were resolved?YNXDo you describe defect resolution and conflict resolution processes?YNXDo you document the security agreements you have with each supplier?YNXDo you expect your suppliers to comply with all security requirements?YNXDo you document the security obligations that your suppliers have?YNXGUIDEGUIDEGUIDEGUIDEGUIDEORGANIZATION:YOUR LOCATION:COMPLETED BY:DATE COMPLETED:REVIEWED BY:DATE REVIEWED:APR 2014PLAIN ENGLISH INFORMATION SECURITY AUDIT TOOLPART 15COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED.EDITION 1.0PAGE 125

ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL15. SUPPLIER RELATIONSHIP MANAGEMENT AUDIT15.1.3 EXPECT SUPPLIERS TO DEAL WITH THEIR OWN SUPPLY CHAIN SECURITY RISKSDo you expect your suppliers to address the information securityrisks connected with their use of information and communicationstechnology services and product supply chains?CTRLDo you include information security risk management requirementsin the agreements you have with your organization’s suppliers?CTRLYNXYNXGUIDEDo you expect your suppliers to control their own supply chain risks?YNXGUIDEDo you prepare supply chain security agreements with your suppliers?YNXDo you define the security requirements that suppliers must meet?YNXDo you define security requirements that apply to your suppliers?YNXGUIDEGUIDEGUIDEDo you expect them to ensure that products meet requirements?YNXGUIDEDo you expect them to ensure that services meet requirements?YNXDo you define the requirements that apply to suppliers’ purchases?YNXGUIDEDo you clarify requirements for information products and services?YNXGUIDEDo you clarify requirements for communications technologies?YNXDo you ask suppliers to create a process to identify critical components?YNXDo you ask them to identify critical product and service components?YNXDo you ask them to pay special attention to critical components?YNXDo you ask them to monitor critical outsourced components?YNXYNXYNXDo you clarify the requirements that your suppliers’ suppliers must meet?YNXDo you ask suppliers to implement security throughout supply chains?YNXDo you ask them to protect the technologies that you depend upon?YNXDo you ask them to protect IT and communication technologies?YNXGUIDEGUIDEGUIDEGUIDEGUIDEGUIDEDo you ask them to ensure that critical components work as expected?GUIDEGUIDEDo you ask them to ensure that the origin of items can be traced?GUIDEGUIDEGUIDEORGANIZATION:YOUR LOCATION:COMPLETED BY:DATE COMPLETED:REVIEWED BY:DATE REVIEWED:APR 2014PLAIN ENGLISH INFORMATION SECURITY AUDIT TOOLPART 15COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED.EDITION 1.0PAGE 126

ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL15. SUPPLIER RELATIONSHIP MANAGEMENT AUDITDo you ask them to safeguard the services that they subcontract?YNXDo you ask suppliers to propagate required security practices?YNXDo you ask them to safeguard the components that they buy?YNXDo you ask suppliers to propagate security requirements?YNXDo you expect suppliers to establish a supplier monitoring process?YNXYNXGUIDEGUIDEGUIDEGUIDEGUIDEDo you expect them to validate technology products and services?GUIDEGUIDEDo you expect them to see if products meet security requirements?YNXGUIDEDo you expect them to see if services meet security requirements?YNXYNXDo you expect them to share information about their supply chains?GUIDEGUIDEDo you ask them to share information about potential problems?YNXGUIDEDo you ask them to share information about component lifecycles?YNXDo you ask them to tell you if items may no longer be available?YNXYNXGUIDEGUIDEDo you ask suppliers to help you manage related security risks?15.2 MANAGE SUPPLIER SECURITY AND SERVICE DELIVERY15.2.1 MANAGE SUPPLIER SERVICES AND SUPPLIER SECURITYCTRLDo you monitor supplier service delivery and information security?YNXCTRLDo you review supplier service delivery and information security?YNXCTRLDo you audit supplier service delivery and information security?YNXHave you established a process to manage your relationship with suppliers?YNXYNXYNXDo you ask suppliers to assign someone to manage service agreements?YNXDo you ask them to enforce agreements and to review compliance?YNXYNXGUIDEDid you assign responsibility for managing your supplier relationships?GUIDEDid you assign this job to an individual or service management team?GUIDEGUIDEGUIDEGUIDEDid you implement your supplier relationship management process?ORGANIZATION:YOUR LOCATION:COMPLETED BY:DATE COMPLETED:REVIEWED BY:DATE REVIEWED:APR 2014PLAIN ENGLISH INFORMATION SECURITY AUDIT TOOLPART 15COPYRIGHT

iso iec 27002 2013 information security audit tool 15. supplier relationship management audit organization: your location: completed by: date completed: reviewed by: date reviewed: apr 2014 plain english information security audit tool edition 1.0 part 15 copyright .File Size: 726KBPage Count: 10