10: 3 Supply Chain Risk Flashcards

1
Q

Vendor Security Policy Minimum

A

ensure that vendors policies are at least as stringent as your own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vendor Management Lifecycle (1)

A

Vendor Selection - May use Request for Proposals, or an informal process. Assess provider’s risk management program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vendor Management Lifecycle (2)

A

Onboarding - Verify contract details, arrange secure data transfer, establish incident procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vendor Management Lifecycle (3)

A

Monitoring - Conduct site visits, review independent audits, handle security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vendor Management Lifecycle (4)

A

Offboarding - Destroy confidential information, unwind a business relationship gracefully

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NDAs

A

Non-disclosure agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SLR

A

Service Level Requirements, document specific requirements customer has about any aspect of the vendor (i.e. system response time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SLA

A

Service Level Agreement - describes condition of service and any penalties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MOU

A

Memorandum of Understanding - letter written to document aspect of relationship (often can be within same organization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BPA

A

Business Partnership Agreement (Responsibilties, division of profits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ISA

A

Interconnection Security Agreement - standards used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MSA

A

Master Services Agreement - Includes all key terms used to govern relationship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SOW

A

Statement of Work - for an individual project, governed by MSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Ownership Language

A

Customer Retains ownership, vendor right to use info is limited, agreements should limit data sharing with third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data protection provisions

A

important if vendor will be sole custodian of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Assessment vs Audits origin

A

Assessments requested by an orgs IT staff, while Audits are performed at request of someone else

17
Q

Audit

A

Detailed tests on a specific standard - Follows a formal standard and a review period, should have clearly defined scope

18
Q

Internal Auditors

A

Works for the org but reports independently, performing work at request of org leadership

19
Q

External Auditors

A

Independent firms that normally perform audits at request of org leadership or regulators

20
Q

User Access Review

A

Validate rights and permissions

21
Q

Gap Analysis

A

Provides a roadmap for future work

22
Q

Use of Cloud Service providers on audits

A

Expands the scope of the audit

23
Q

SOC Reports

A

Service Organizational control reports - Audits done by cloud providers themselves

24
Q

SOC 1

A

Provides assurance required for customer financial audits

25
Q

SOC 2

A

Provides detailed assurance of confidentiality, integrity, and availability controls

26
Q

SOC 3

A

Provides high-level public reporting of confidentiality, integrity, and availability controls

27
Q

Type 1 Report

A

Describes the controls that the provide has in place and an opinion on the suitability of these controls

28
Q

Type 2 Report

A

Includes the Type 1 information, and a test to ensure the controls are working