10. Supplier relationships  

10.1 Information security in supplier relationships

Objective: To ensure protection of the organization’s assets that is accessible by suppliers.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

10.2 Supplier service delivery management

Objective: To maintain an agreed level of information security and service delivery in line with supplier agreements.

10.1.1 Information security policy for supplier relationships  

Information security requirements for mitigating the risks associated with supplier’s access to the organization’s assets should be agreed with the supplier and documented.

  • Indentify information security controls in relevant processess and procedures to address supplier access to the organization’s information. For example, if there is a special need for confidentiality of the information, non-disclosure agreements can be used. Another example is data protection risks when the supplier agreement involves transfer of, or access to, information across borders. 
  • Create a standardised process and lifecycle for managing supplier relationships, inclulding:
    a) identify and document the types of suppliers, e.g. IT services, logistics utilities, financial services, IT infrastructure components, whom the organization will allow to access its information;
    b) define the types of information access that different types of suppliers will be allowed, and monitor and control the access;
    c) define minimum information security requirements for each type of information and type of access and obligations of suppliers to protect the organization’s information;
    d) monitor adherence to established information security requirements for each type of supplier and type of access; 
    e) define the procedure of handling incidents and contingencies associated with supplier access including responsibilities of both the organization and suppliers;
    f) define recovery and contingency arrangements to ensure the availability of the information or information processing provided by either party;
    j) address awareness training for the organization’s personnel interacting with supplier personnel.

See also: 

10.1.2 Addressing security within supplier agreements 

All relevant information security requirements should be established and agreed with each supplier that may access, process, store, communicate, or provide IT infrastructure components for, the organization’s information.   

Establish and document supplier agreements to avoid misunderstanding between the organization and the supplier regarding both parties’ obligations. 

Develop the agreements with suppliers and include:
a) description of the information to be provided or accessed, sensitivity of information (classification) and methods of providing or accessing the information;
b) legal and regulatory requirements, including data protection, intellectual property rights and copyright, and a description of how it will be ensured;
c) obligation of each contractual party to implement an agreed set of controls including access control, performance review, monitoring, reporting and auditing;
d) list of supplier personnel authorized to access or receive the organization’s information or procedures or conditions for authorization;
e) incident management requirements and procedures (especially notification and collaboration during incident remediation);
f) training and awareness requirements for specific procedures and information security requirements, e.g. for incident response, authorization procedures;
g) relevant regulations for sub-contracting, including the controls that need to be implemented;
h) supplier’s obligations to comply with the organization’s security requirements and relevant agreement partners, including a contact person for information security issues;
i) screening requirements, if any, for supplier’s personnel;
j) right to audit the supplier processes and controls related to the agreement;
k) conflict and defect resolution processes. 

Agreements with suppliers should include requirements to address the information security risks associated with information and communications technology services and product supply chain. Organizations can influence ICT technology supply chain, including cloud computing services, security practices by making clear in agreements with their suppliers the matters that should be addressed by other suppliers in the information and communication technology supply chain.