Third-Party Management

Mechanisms exist to document and maintain a Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to delineate assignment for cybersecurity & data privacy controls between internal stakeholders and External Service Providers (ESPs).


Login

Third-Party Management

Mechanisms exist to perform recurring validation of the Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to ensure cybersecurity & data privacy control assignments accurately reflect current business practices, compliance obligations, technologies and stakeholders.


Login

Third-Party Management

Mechanisms exist to obtain a First-Party Declaration (1PD) from applicable External Service Providers (ESPs) that provides assurance of compliance with specified statutory, regulatory and contractual obligations for cybersecurity & data privacy controls, including any flow-down requirements to subcontractors.


Login

Third-Party Management

Level N/A

Mechanisms exist to include "break clauses" within contracts for failure to meet contract criteria for cybersecurity and/or data privacy controls.


Login

Third-Party Management

Mechanisms exist to control personnel security requirements including security roles and responsibilities for third-party providers.


Login

Third-Party Management

Mechanisms exist to monitor for evidence of unauthorized exfiltration or disclosure of organizational information.


Login

Third-Party Management

Mechanisms exist to monitor, regularly review and audit External Service Providers (ESPs) for compliance with established contractual requirements for cybersecurity & data privacy controls.


Login

Third-Party Management

Mechanisms exist to address weaknesses or deficiencies in supply chain elements identified during independent or organizational assessments of such elements.


Login

Third-Party Management

Mechanisms exist to control changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party.


Login

Third-Party Management

Mechanisms exist to ensure response/recovery planning and testing are conducted with critical suppliers/providers.


Login