Vendor Security Checklist
Vendor Security Checklist
Vendor Security Checklist
Page | 1
Follow Ministry of Security on
Information Security
Control statement Control Implemented Remarks
(Yes, No, Partial, NA)
Do you have a valid third-party
information security/cybersecurity
attestation or certification?
Do you have company-wide, publicly
available information security policies in
place?
Is the Information Security Policy is
reviewed at planned intervals, or if
significant changes occur to ensure its
continuing suitability, adequacy and
effectiveness?
What mechanisms are in place to ensure
your policies are enforced within your
supply chain?
Are the roles and responsibilities
pertaining to information security
defined and communicated to all
employees?
Asset Management
Control statement Control Implemented Remarks
(Yes, No, Partial, NA)
Do you have an asset management
program approved by management for
your IT assets?
What are your methods to manage IT
assets on the network?
How do you manage other IT hardware
and software assets, which are not
network connected, regardless of
network presence?
Do you have documented policies or
procedures to manage enterprise
assets throughout their lifecycle.
Do you have policies or procedures to
ensure your enterprise software
platforms applications, and hardware
Page | 2
Follow Ministry of Security on
Page | 3
Follow Ministry of Security on
Page | 4
Follow Ministry of Security on
Page | 5
Follow Ministry of Security on
Physical Security
Control statement Control Implemented Remarks
(Yes, No, Partial, NA)
Do you have physical security
procedures defined and followed that
address the control of physical access,
environmental protection, equipment
maintenance, equipment siting, visitor
management etc.
Is access to sensitive areas (server
location, tape library, computer room,
etc.) physically restricted to authorized
personnel, If yes, does the physical
access system log the access capturing
the data, time, door access, employee
coordinates during logging physical
access.
Are all physical access control logs
periodically reviewed and retained per
retention requirements.
Are visitors signed into the building by
an employee who accepts responsibility
for the visitors during the course of
their visit.
Do you have fire alarm/suppression
systems installed across office (secure
areas/work areas).
Do you use CCTV cameras to monitor
the facility on a 24x7?
Are redundant power supplies available
for supplying power to critical
equipment?
Is there an Uninterruptible Power Supply
(UPS) or DG set backup for the
premises?
Is lightning protection applied to the
buildings and lightning protection filters
fitted to all incoming power and
communications lines at the premise
housing work area and information
processing facilities?
Are all the information systems
equipment's maintained in accordance
Page | 6
Follow Ministry of Security on
Operations Security
Control statement Control Implemented Remarks
(Yes, No, Partial, NA)
Are applications and operating system
software implemented after extensive
and successful security testing.
Is there a log maintained to track
installation of operational software on
workstations.
Do operational systems hold only
approved Software’s and there is a
periodic audit to track Software
Compliance.
Are users disallowed to install software
on their workstations.
Are external drives such as CDs and USB
drives disabled on all desktops and
Page | 7
Follow Ministry of Security on
Page | 10
Follow Ministry of Security on
Business Continuity
Control statement Control Implemented Remarks
(Yes, No, Partial, NA)
Do you maintain a formal business
continuity plan necessary to maintain
operations through disruptions and
significant loss of staff.
Do you have a Disaster Recovery Plan in
place to support recovery of key
products & services
Do you maintain a formally trained and
dedicated crisis management team,
including on-call staff, assigned to
address catastrophic or systemic risks
to your supply chain processes?
Do you have a Test Calendar in place to
test Business Continuity Plan?
Authors
Niranjan V
ISO 27001 LA
Page | 11