top of page

Supplier Digest

Relationship Manager

Company

Contractual Terms

Company

critical.PNG
accepted.PNG
critical - Copy.PNG
Warning2.PNG

Due Diligence Exercise

Company

critical.PNG
Warning2.PNG
critical - Copy.PNG
accepted.PNG

Due Diligence Performance

Company

critical.PNG
accepted.PNG
critical - Copy.PNG
Warning2.PNG

Existing Major Weakness

Company

critical.PNG
accepted.PNG
critical - Copy.PNG
Warning2.PNG

Cyber Resilience

Company

critical.PNG
accepted.PNG
critical - Copy.PNG
Warning2.PNG

Data Privacy

Company

critical.PNG
Warning2.PNG
critical - Copy.PNG
accepted.PNG

Serviceability

Company

critical.PNG
accepted.PNG
critical - Copy.PNG
Warning2.PNG

Risk Source: Auto-Pilot Assessment

-

Attack Exposure (Live)

A

Risk Source : Brandefense

loading_apple.gif

Sorry! our records showing that this operation is not valid due to your company's license limitation. Please contact the Admin team.

Assessment Library
Cyber Resilience Library: Secure Forte's scenario-based library features a comprehensive questionnaire that covers Cyber Security, Data Privacy, and Serviceability.
Customised Questionnaire: Company's internally developed customised questionnaire that can be used to complement the Cyber Resilience questionnaire.
Do you want to conduct the assessment on behalf of the supplier?(not recommended)
Do you want to schedule this assessment for later?
Self assessment: In some rare cases, the supplier may not want to participate in the risk assessment exercise and you want to conduct the assessment on their behalf. While this is not the ideal situation, it is a possibility that should be anticipated.
Please define the supplier required details!

Are you sure you want to delete this supplier?

loading_apple.gif

Self-Assessment

The supplier’s operational environment relevant to your organisation may have been certified against any of the following internationally accepted standards or frameworks:

  • The acceptable frameworks for Information Security capabilities are ISO 27001 and SOC 2 Type 2 report.

  • The acceptable standard for Data Privacy is ISO 27701.

  • The acceptable standard for Quality Management is ISO 9001.

If the supplier has provided you with a valid copy of the certifications or attestation reports against any of the above frameworks, you can upload them into the relevant boxes below, and the platform will assign a “Defined” or 3/5 rating compared to the ISACA CMMI framework.

ISMS
Max File Size 15MB
loading_apple_edited.png
PIMS
Max File Size 15MB
loading_apple_edited.png
QMS
Max File Size 15MB
loading_apple_edited.png

Sorry This file is not Valid, please try another file.

For areas where the attestation reports have not been provided, the platform will assign an “Initial” score for each control. In that case, please browse the Supplier Report, click on 'Audit Data', and then modify the responses based on other evidence of control implementation provided by the supplier.

Resend user verification email to supplier

To assist the Supplier in completing their user registration for the Secure Forte portal, you may resend the account verification and password setup email. Please select the appropriate user from the list below and click 'Send' to proceed.

Supplier_ring_edited_edited_edited_edite

0

Total Suppliers

Supplier_ring_edited_edited_edited_edite

0

3rd Parties

Supplier_ring_edited_edited_edited_edite

0

4th Parties

Primary Assets

Supplier Information

Risk Monitoring

Issue Status

Assessment

Relationship
Profile
Control Name
Response
Criticality Tier
Response
ISMS
Status
progress01_edited_edited.png
progress52_edited.jpg
progress32_edited.jpg
progress22_edited.jpg
progress12_edited.jpg
progress62_edited.jpg
Attack
Exposure
N/A
Risk
Overall
critical - Copy.PNG
critical.PNG
accepted.PNG
Warning2.PNG
Issue Assignment
report.jpg
Issue
Status
Not Assigned
Assessment
Status
Response
Assessment
Report
report.jpg
Last Assessment
Response
Upcoming Assessment
-
loading_apple.gif
loading_apple.gif

Public Intelligence Overview

Domain
Risk Rating
Insight
Risk Rationale
Source

-

Point in Time Assessment

Data Privacy

Information Security

No data

No data

-

-

loading_apple.gif

PDF Report

Compliance

No data

Quality Management System

comply

Environmental Management System

comply

PCI-DSS

comply

Adopted Frameworks

-

-

-

-

-

-

-

-

-

Data Location

Custom Questions

Status

-

Attack Exposure | Dark Web Findings

Overall Score

A

 |  84

Compromised Device

A

 |   84

Black Market Acitivity

A

 |   84

Email Breach

A

 |   84

Security Grading

A

 |   84

Phishing Domain

A

 |   84

Dark Chatting

A

 |   84

This represents the overall count of findings related to compromised devices. These findings indicate instances where assets within the third party have been compromised by threat actors using seater malware.

Most recent Incidents

Issue Properties
Date
Severity
bottom of page