THIRD PARTY SECURITY ASSESSMENT

How much do you trust your third party providers, can you and do you have sufficient assurance?

This is an information security risk assessment designed to validate the information security controls in place when using third parties to verify whether appropriate controls and processes are in place to protect information.

The first of the two document should be sent to your third party provider (ideally before you select them; but if you already use them then you can conduct this on a periodic basis nonetheless). The second is a scoring document which is used to collate the responses and will automagically provide you with a scoring dashboard.

As soon as time permits this will be iterated into a web application.

3rdParty_RA

3rdParty_RA-SCORING