top of page

Add more supplier?

loading_apple.gif

Supplier Profile

Supplier Name

Supplier Service

Contact Name

Contact Email Address

Contact Phone Number

(optional)

Does the supplier’s contract include adequate clauses covering non-disclosure of the Customer Information?

Does the supplier’s contract include the following list of Information Security controls?

  • Data at-rest and in-transit protection

  • Information Security awareness training for all staff with access to the Customer Information

  • Cryptographic key management system

  • Customer data breach notification

  • Secure processes for management and disposal of Customer Information

  • Limited access to the Customer Information based on the “Need to Know” and “Least Privilege” principles

a

Have you ever assessed the supplier's Information Security capabilities over the environment containing the Customer Information according to the requirements of an accepted security framework (e.g., ISO 27001, NIST Cybersecurity, PCI-DSS)?

a
Did the assessment include reviewing evidence of control implementation?
a

Have you noticed any unresolved control weakness within the supplier environment that could have a major impact on the confidentiality or availability of the Customer Information?

Supplier Service

(optional)

Acknowledgement

Please fill in all the mandatory fields!

Supplier Profile

Supplier Name

Industry

Contact Name

Contact Email Address

Onboarding Date

(optional)

Contact Phone Number

(optional)

Expiry Date

(optional)

Public Domain

(optional)

Upload Contract
Max File Size 15MB

View Contract

(optional)

(optional)

Supplier Attestation Documents

ISMS
Max File Size 15MB
loading_apple_edited.png
PIMS
Max File Size 15MB

View Document

(optional)

loading_apple_edited.png

(optional)

View Document

QMS
Max File Size 15MB
loading_apple_edited.png

(optional)

View Document

Sorry This file is not Valid, please try another file.

Data Access

(Select if applicable)

Connected Primary Assets

Should the audit function review the evidence of control implementation?

How easy it is to replace the Supplier?

(optional)

Additional Comments

Please select data/system exposure tier by the supplier

Please review the calculated supplier criticality and click on Submit button to complete the form.

Please fill in all the mandatory fields!

bottom of page