Vendor Risk Assessment Checklist
Vendor Risk Assessment Checklist
Understand
Establish Risk Assess Every
the Different
Criteria Vendor
Types of Risk
Segrigate Conduct
Develop Risk
Vendors based Annual
Mitigation Plan
on Risk Level Assessments
Statement Remarks
Vendor Name <Full Name>
Application Name/Outsourced Service <Name of the Application/Service Outsourced>
INFORMATION SECURITY
Control Statement Control Remarks
Implemented
(Yes, No,
Partial, NA)
Do you have a valid third-party
information security/cybersecurity
attestation or certification.
Do you have company-wide, publicly
available information security policies in
place
Whether the Information Security Policy
is reviewed at planned intervals, or if
significant changes occur to ensure its
continuing suitability, adequacy and
effectiveness.
What mechanisms are in place to ensure
your policies are enforced within your
supply chain.
Are the roles and responsibilities
pertaining to information security
defined and communicated to all
employees.
ASSET MANAGEMENT
Control Statement Control Remarks
Implemented
(Yes, No,
Partial, NA)
Do you have an asset management
program approved by management for
your IT assets.
What are your methods to manage IT
assets on the network.
How do you manage other IT hardware
and software assets which are not
network connected, regardless of
network presence.
What are your methods of verifying
acceptable use of assets, including
verified asset return, for your network-
connected assets.
VENDOR RISK ASSESSMENT CHECKLIST
Do you have documented policies or
procedures to manage enterprise assets
throughout their lifecycle.
Do you have policies or procedures to
ensure your enterprise software
platforms applications, and hardware
assets, are classified according to their
criticality.
Do you have policies or procedures to
ensure appropriate controls are in place
for internal or third-party cloud services.
Do you maintain an up-to-date inventory
of hardware and software assets to
ensure their accountability and integrity.
Do you have acceptable use of assets
policy documented.
Do you have processes or procedures in
place to ensure that devices and
software installed by users external to
your IT department are being discovered,
properly secured, and managed.
Do you have processes or procedures for
secure disposal of your assets.
Are media containing information
(customer data, personal data, bank
data) protected against unauthorized
access, misuse or corruption during
transportation beyond the organization’s
physical boundary.
Do you maintain information labelling
and handling procedures. Are
documented information agged/labelled
as per your asset classification schema.
BUSINESS CONTINUITY
Control Statement Control Remarks
Implemented
(Yes, No,
Partial, NA)
Do you maintain a formal business
continuity plan necessary to maintain
operations through disruptions and
significant loss of staff.
Do you have a Disaster Recovery Plan in
place to support recovery of key products
& services
Do you maintain a formally trained and
dedicated crisis management team,
including on-call staff, assigned to
address catastrophic or systemic risks to
your supply chain or manufacturing
processes.
Do you have a Test Calendar in place to
test Business Continuity Plan.
PHYSICAL SECURITY
Control Statement Control Remarks
Implemented
(Yes, No, Partial,
NA)
Do you have physical security
procedures defined and followed that
address the control of physical access,
environmental protection, equipment
maintenance, equipment siting, visitor
management etc.
What training do all staff receive to
address potential physical security
threats and how to respond to
emergencies (e.g., fire, weather, etc.)
Is access to sensitive areas (server
location, tape library, computer room,
etc.) physically restricted to authorized
VENDOR RISK ASSESSMENT CHECKLIST
personnel, If yes, does the physical
access system log the access capturing
the data, time, door access, employee
coordinates during logging physical
access.
Are all physical access control logs
periodically reviewed and retained per
retention requirements.
Are visitors signed into the building by
an employee who accepts
responsibility for the visitors during the
course of their visit.
Are secure work areas adequately
protected against environmental
hazards.
Do you have fire alarm/suppression
systems installed across office (secure
areas/work areas).
Are information processing facilities
separated from other facilities.
Are photographic, video, audio or other
recording equipment, such as cameras
in mobile restricted to be carried inside
secure areas/ work areas/ information
processing facilities.
Are vacant secure areas physically
locked and periodically reviewed.
Do you use CCTV cameras to monitor
the facility on a 24x7. If Yes, are all
cameras operating and positioned
properly to view activity at all
entrances/exits to the facility and
sensitive areas (e.g.. call center,
computer room).
Are redundant power supplies available
for supplying power to critical
equipment. Is there a Uninterruptible
Power Supply (UPS) or DG set backup
for computer systems
Is lightning protection applied to the
buildings and lightning protection
filters fitted to all incoming power and
communications lines at the premise
housing work area and information
processing facilities
Are all the information systems
equipment's maintained in accordance
with the supplier’s recommended
service intervals and specifications
Are records kept of all suspected or
actual faults and all maintenance
activities performed on equipment's
VENDOR RISK ASSESSMENT CHECKLIST
Is the maintenance carried out by
authorized personnel only
Do you have process in place to manage
movement of assets in and out of the
organization
Do you have processes in place to
prevent counterfeit parts from entering
your supply chain.
Do you have process in place to protect
unattended equipment within the
organization
Do you have a clear desk and clear
screen policy in force in the
organization.
Do you have a documented Security
Incident Response process covering
physical security incidents