cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
ylomax
Newcomer II

Accessing third party-vendor

Does anybody know where I find a relative inexpensive tool to use for third party vendor assessment? Qualys has one within the tool but it's $4000.00 any my boss not sure he wants to pay for that right now? if not a toll maybe even a good excel sheet with questions that are not too many but serve the purpose? questions dealing with 270001, SOC 1 type 11, HIPPA etc.….

4 Replies
AppDefects
Community Champion


@ylomax wrote:

Does anybody know where I find a relative inexpensive tool to use for third party vendor assessment? Qualys has one within the tool but it's $4000.00 any my boss not sure he wants to pay for that right now? if not a toll maybe even a good excel sheet with questions that are not too many but serve the purpose? questions dealing with 270001, SOC 1 type 11, HIPPA etc.….


Tell us more about the scope of the third-party vendor "engagement". The type of data involved and whether or not you procuring COTS, SaaS, or something other Cloud service.

ylomax
Newcomer II

Most of the vendors are SAAS providers, the data is mostly health related information. 

Steve-Wilme
Advocate II

You need to make a distinction between what you're assessing; the vendors general approach to security or the security of the specific services that you're buying from them, as that should guide how you go about it.

 

If you look at it in terms of the source of assurance you can use that may help:

 

1 Supplier assertion - The supplier asserts in the sales material, service descriptions, marketing and in verbal representations that their service is secure (Low)
2 Contractual Commitment - The supplier commits contractually to operate specific security controls and follow good industry practice (High)
3 Off site supplier assessment - The suppliers answers a standardised questionnaire, provides supporting documentary evidence requested and may also demonstrate aspect of their security via Webex, Skype or similar technology. (Medium)
4 On site supplier assessment - The suppliers answers a standardised questionnaire and allows an on site assessment by a security auditor, providing opportunity to observe operation of controls and/or view systems and documentation. (High)
5 Architectural Review A qualified and experienced security architect reviews the architectural design of the service(s) to ensure that they are designed to be technically secure (Medium/Low)
6 Service is built from known secure components - A security architect or auditor reviews the certifications and/or audit reports on the technical components making up the service (Low)
7 Previous Auditor Work - Independent auditors, including certification auditors have previously and recently audited the suppliers service(s) and ISMS and issued either a certificate or unqualified opinion as to it’s security High
8 Independent Penetration Test - An independent penetration test of the service(s) is either carried out by your organisation, its chosen external pen test company or a recent independent CHECK/CREST pen test report is provided by the supplier. (Medium)

 

So there are multiple methods.  You might also want to look at the CSAs STAR scheme.

 

 

-----------------------------------------------------------
Steve Wilme CISSP-ISSAP, ISSMP MCIIS
ylomax
Newcomer II

Thanks-you for your response.