SlideShare a Scribd company logo
1 of 6
Download to read offline
1
Cyber Risk
Guide to Vendor
Questionnaires
2
How Can You
Trust a Vendor?
Independent external assessments of vendors
can reveal some of their operational and security
practices, and often telegraph the state of
their internal environment. However, external
assessments only see the perimeter. For a true risk
assessment, vendors are often asked to answer a
series of questions about their methods, software,
and vendors, so that the company contracting
them can get visibility into the environment which
will be handling their data.
The importance of such questionnaires are
probably self-evident, but the difficulties they entail
may not be— unless you’ve ever done it. Writing,
sending, and reviewing vendor questionnaires is
a time consuming process for a company— and
when that company has several dozen, hundred,
or even thousand vendors, it becomes a logistical
impossibility to thoroughly manage them all
and keep track of technical self-assessments,
making the entire exercise performative, and
without real value.
UpGuard
CyberRisk
UpGuard’s CyberRisk product not only performs
a thorough external assessment and scoring of
vendors, but automates the questionnaire process
and integrates it into the product itself, creating a
single intuitive repository for vendor assessment
data. UpGuard offers a selection of prepared
questionnaires that cover every area of vendor
cyber risk. Sending them out is as easy as creating
a contact email for a vendor and clicking a button.
Questionnaires are then stored in UpGuard and
tracked over time, automatically renewed at your
specified interval to keep answers up to date and
create a defensible record of vendor due diligence.
Total Coverage
Why it Matters
The questionnaires provided by UpGuard cover
every area of risk, from web applications to physical
security. Total coverage is important, because a
vendor risk assessment that fails to account for
some vector of risk is incomplete, and blindspots
can create massive vulnerabilities that fly under the
radar, despite best efforts to secure that which is
being covered. Because of this breadth of coverage,
UpGuard’s questionnaires are flexible enough to
adapt to each business and get the information they
care about from the vendors handling their data.
We’ll look at the core questionnaires provided in
UpGuard CyberRisk and how organizations can
customize them for optimal assessment.
3
Web Application Security
For vendors providing a service through a web
application, we provide a questionnaire that covers
every surface of web application and data storage
risk. With this questionnaire we can answer the
following kinds of questions:
•	 Does the web application use proper
encryption to protect client traffic?
•	 Is the authentication mechanism used to access
sensitive data secure?
•	 What vendors are used by the application?
(Cloud providers, for example)
•	 Does the application contain known
vulnerabilities with available exploits?
•	 Do the operational methods of the vendor
minimize the risk of data exposure? (For
example, do they test their configurations as
part of the deployment process?)
Infrastructure Security
For vendors that will be hosting data or services
in their data center, UpGuard provides a
questionnaire that validates network and server
technology and processes. The Infrastructure
Security questionnaire can help answer:
•	 Does the vendor have a network policy that
protects customer data?
•	 Are best practice network defenses in place
and properly configured?
•	 How are servers hosting customer data and
services hardened against attack?
•	 Is access to customer data within the vendor
limited to the appropriate people?
•	 What are the vendor’s backup and
recovery methods?
Physical & Data Center Security
Cybersecurity has to encompass old-fashioned
physical security to protect assets against theft
and fraud from both insiders and attackers. This
UpGuard questionnaire details the vendor’s
physical security practices and measures the risk of
their access control, answering questions like:
•	 Are vendor facilities exclusive, or shared with
other tenants?
•	 How are technological assets secured against
theft and tampering?
•	 Is the vendor data center local, in the
cloud, or hybrid?
•	 Does the vendor have a written security policy
for office facilities?
•	 What parts of the data center are outsourced,
if any?
Security and Privacy Programs
While the other core questionnaires focus
on operational practices and technology, this
questionnaire helps understand what active
measures a vendor takes to protect customer
assets from cyber attacks and misuse. This
questionnaire can answer important questions
about vendor risk mitigation and security controls,
including:
•	 Does the vendor perform internal and/or
third party audits of systems and data?
•	 How does the vendor manage risk in
their vendors?
•	 What does the vendor do in the event of
a data breach?
•	 Does the vendor have a resilient change
management process?
•	 Are best practices followed regarding
internal access controls and least privilege?
4
Custom Tailored
These core questionnaires cover the digital
environment in general terms, but every vendor is
different, and every company cares about different
things from their vendors. This is why UpGuard
provides customization options for vendor
questionnaires, so that information can be tailored
to specific concerns, without overwhelming either
party with irrelevant technical details.
What the Vendor Sees
To reduce the amount of time necessary to
complete and review questionnaires, our forms
change dynamically based on how questions are
answered so that non-applicable information isn’t
asked for or gathered. It’s not just about asking and
answering questions either. As a vendor answers
the questionnaire, risks are pointed out to them
with severity ratings, along with notes about why
their answer is risky and what can be done to
mitigate it. When the questionnaire is opened by
the vendor, the status within UpGuard changes
to “in progress,” so you can better understand the
questionnaire workflow. Vendors can access a read-
only version of completed questionnaires at any
time by using a link provided to them in email.
Stored and
Recorded
TOTAL VENDOR RISK ANALYSIS IN ONE PLACE
Vendor Contacts
Create email contacts for each vendor within
UpGuard to track contact points for questionnaires
and other communication.
Questionnaires are sent per contact, so different
questionnaires can be given to different people
at the same vendor if, for example, different
teams handle web applications and physical
security. This granularity ensures that everybody
does only the necessary work relevant to the
relationship at hand.
Questionnaire Results
Completed questionnaires are stored in UpGuard
for each vendor, and available for review at any
time. When viewing a completed questionnaire,
the same feedback given to the vendor is available
for review, so the risks of that vendor can be better
understood, along with what it takes to fix them.
Answers that don’t meet security best practices or
otherwise introduce cyber risk are clearly flagged
and categorized into three severity levels.
External Assessment
UpGuard CyberRisk performs continuous external
assessment of all internet facing domains for all
vendors to ensure up to date risk profiles. Every
vendor is ranked using CSTAR, UpGuard’s risk
scoring engine, and given a score between 0-950,
like a credit score. The score provides the high
level overview of vendor risk, while the CyberRisk
interface can drill down into details, and offer
suggestions on how to remediate problems.
Recorded and Tracked Over Time
UpGuard acts as an automated system of record
for vendor security assessments and third party
due diligence. In the event of a third party breach
or data exposure, these assessments can be
used in forensics to understand vendor claims
and practices. UpGuard tracks vendors over
time, showing the trends and trajectory of their
risk profile. By retaining questionnaires for the
entirety of the vendor relationship, UpGuard is
able to detect variance in vendor status, so that
changes in a vendor’s reported practices and
policies don’t go undetected.
5
Auto-Renewal
Manual Renewal is Unsustainable
While an initial questionnaire is crucial to
determine whether a vendor relationship is
feasible, refreshing questionnaires at regular
intervals helps ensure that the most up to date
information is available, and that changes to
the initial acceptable questionnaire are noted
and understood. But renewing questionnaires
at scale requires a massive amount of work and
documentation, most of which goes undone, as
tedious due diligence tends to fall to the bottom
of the priority list when things are hectic—
even when compliance regulations require
regular reassessment.
How UpGuard Helps
UpGuard handles questionnaire renewal
automatically, keeping track of which vendors
need to be renewed, and automatically sending the
selected questionnaires to the appropriate contact.
Renewals are stored alongside originals so the full
documentation trail is available for each vendor,
and changes in policy can be mapped out easily.
UpGuard will also automatically remind vendors to
complete their assessments on a regular schedule,
to help move the process along to completion
without manual intervention.
Conclusion
Managing third and fourth party cyber risk
shouldn’t be difficult. In fact, it can’t be difficult to
function effectively, especially at scale. UpGuard
consolidates and automates the vendor assessment
process to document, understand, and explain the
possible ways in which an organization’s data and
technology can be damaged by third parties. By
performing a comprehensive technical assessment
and providing integrated questionnaire services,
UpGuard allows vendors to be managed at scale
without special technical knowledge, while
providing technical users with the details they need
to make better decisions.
6
Businesses depend on trust, but breaches and outages
erode that trust. UpGuard is the world’s first cyber
resilience platform, designed to proactively assess and
manage the business risks posed by technology.
UpGuard gathers complete information across
every digital surface, stores it in a single, searchable
repository, and provides continuous validation and
insightful visualizations so companies can make
informed decisions.
909 San Rafael Ave.
Mountain View, CA 94043
+1 888 882 3223
www.UpGuard.com
© 2017 UpGuard, Inc. All rights reserved. UpGuard and the
UpGuard logo are registered trademarks of UpGuard, Inc. All other
products or services mentioned herein are trademarks of their
respective companies. Information subject to change without notice.

More Related Content

Similar to UpGuard - Complete Guide to Vendor Questionnaires

managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guideMarie Peters
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideHCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerHCLSoftware
 
Digital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainDigital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainShawn Brown
 
Vendor Compliance Management software
Vendor Compliance Management softwareVendor Compliance Management software
Vendor Compliance Management softwarejugnuRana2
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Wendy Knox Everette
 
Why software testing is very important for banking applications?
Why software testing is very important for banking applications?Why software testing is very important for banking applications?
Why software testing is very important for banking applications?BugRaptors
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCruzIbarra161
 
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...Andrew O. Leeth
 
EHS Software Buyer Checklist
EHS Software Buyer ChecklistEHS Software Buyer Checklist
EHS Software Buyer ChecklistAnita Amelia
 
Source Code Audit in Application Development.pptx
Source Code Audit in Application Development.pptxSource Code Audit in Application Development.pptx
Source Code Audit in Application Development.pptxGROWEXX LTD
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfElanusTechnologies
 
TrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTuan Phan
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report exampleIhor Uzhvenko
 
Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360Simplify360
 
Education & Training39SecurityMagazine.com SECURITY JU
Education & Training39SecurityMagazine.com  SECURITY  JUEducation & Training39SecurityMagazine.com  SECURITY  JU
Education & Training39SecurityMagazine.com SECURITY JUEvonCanales257
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docxevonnehoggarth79783
 

Similar to UpGuard - Complete Guide to Vendor Questionnaires (20)

managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guide
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
Digital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainDigital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychain
 
Vendor Compliance Management software
Vendor Compliance Management softwareVendor Compliance Management software
Vendor Compliance Management software
 
Vendor Management Buyers Guide
Vendor Management Buyers GuideVendor Management Buyers Guide
Vendor Management Buyers Guide
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
Why software testing is very important for banking applications?
Why software testing is very important for banking applications?Why software testing is very important for banking applications?
Why software testing is very important for banking applications?
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
 
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
 
Information Security
Information SecurityInformation Security
Information Security
 
EHS Software Buyer Checklist
EHS Software Buyer ChecklistEHS Software Buyer Checklist
EHS Software Buyer Checklist
 
Source Code Audit in Application Development.pptx
Source Code Audit in Application Development.pptxSource Code Audit in Application Development.pptx
Source Code Audit in Application Development.pptx
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
 
Abb e guide3
Abb e guide3Abb e guide3
Abb e guide3
 
TrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security Authorization
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
 
Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360
 
Education & Training39SecurityMagazine.com SECURITY JU
Education & Training39SecurityMagazine.com  SECURITY  JUEducation & Training39SecurityMagazine.com  SECURITY  JU
Education & Training39SecurityMagazine.com SECURITY JU
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

UpGuard - Complete Guide to Vendor Questionnaires

  • 1. 1 Cyber Risk Guide to Vendor Questionnaires
  • 2. 2 How Can You Trust a Vendor? Independent external assessments of vendors can reveal some of their operational and security practices, and often telegraph the state of their internal environment. However, external assessments only see the perimeter. For a true risk assessment, vendors are often asked to answer a series of questions about their methods, software, and vendors, so that the company contracting them can get visibility into the environment which will be handling their data. The importance of such questionnaires are probably self-evident, but the difficulties they entail may not be— unless you’ve ever done it. Writing, sending, and reviewing vendor questionnaires is a time consuming process for a company— and when that company has several dozen, hundred, or even thousand vendors, it becomes a logistical impossibility to thoroughly manage them all and keep track of technical self-assessments, making the entire exercise performative, and without real value. UpGuard CyberRisk UpGuard’s CyberRisk product not only performs a thorough external assessment and scoring of vendors, but automates the questionnaire process and integrates it into the product itself, creating a single intuitive repository for vendor assessment data. UpGuard offers a selection of prepared questionnaires that cover every area of vendor cyber risk. Sending them out is as easy as creating a contact email for a vendor and clicking a button. Questionnaires are then stored in UpGuard and tracked over time, automatically renewed at your specified interval to keep answers up to date and create a defensible record of vendor due diligence. Total Coverage Why it Matters The questionnaires provided by UpGuard cover every area of risk, from web applications to physical security. Total coverage is important, because a vendor risk assessment that fails to account for some vector of risk is incomplete, and blindspots can create massive vulnerabilities that fly under the radar, despite best efforts to secure that which is being covered. Because of this breadth of coverage, UpGuard’s questionnaires are flexible enough to adapt to each business and get the information they care about from the vendors handling their data. We’ll look at the core questionnaires provided in UpGuard CyberRisk and how organizations can customize them for optimal assessment.
  • 3. 3 Web Application Security For vendors providing a service through a web application, we provide a questionnaire that covers every surface of web application and data storage risk. With this questionnaire we can answer the following kinds of questions: • Does the web application use proper encryption to protect client traffic? • Is the authentication mechanism used to access sensitive data secure? • What vendors are used by the application? (Cloud providers, for example) • Does the application contain known vulnerabilities with available exploits? • Do the operational methods of the vendor minimize the risk of data exposure? (For example, do they test their configurations as part of the deployment process?) Infrastructure Security For vendors that will be hosting data or services in their data center, UpGuard provides a questionnaire that validates network and server technology and processes. The Infrastructure Security questionnaire can help answer: • Does the vendor have a network policy that protects customer data? • Are best practice network defenses in place and properly configured? • How are servers hosting customer data and services hardened against attack? • Is access to customer data within the vendor limited to the appropriate people? • What are the vendor’s backup and recovery methods? Physical & Data Center Security Cybersecurity has to encompass old-fashioned physical security to protect assets against theft and fraud from both insiders and attackers. This UpGuard questionnaire details the vendor’s physical security practices and measures the risk of their access control, answering questions like: • Are vendor facilities exclusive, or shared with other tenants? • How are technological assets secured against theft and tampering? • Is the vendor data center local, in the cloud, or hybrid? • Does the vendor have a written security policy for office facilities? • What parts of the data center are outsourced, if any? Security and Privacy Programs While the other core questionnaires focus on operational practices and technology, this questionnaire helps understand what active measures a vendor takes to protect customer assets from cyber attacks and misuse. This questionnaire can answer important questions about vendor risk mitigation and security controls, including: • Does the vendor perform internal and/or third party audits of systems and data? • How does the vendor manage risk in their vendors? • What does the vendor do in the event of a data breach? • Does the vendor have a resilient change management process? • Are best practices followed regarding internal access controls and least privilege?
  • 4. 4 Custom Tailored These core questionnaires cover the digital environment in general terms, but every vendor is different, and every company cares about different things from their vendors. This is why UpGuard provides customization options for vendor questionnaires, so that information can be tailored to specific concerns, without overwhelming either party with irrelevant technical details. What the Vendor Sees To reduce the amount of time necessary to complete and review questionnaires, our forms change dynamically based on how questions are answered so that non-applicable information isn’t asked for or gathered. It’s not just about asking and answering questions either. As a vendor answers the questionnaire, risks are pointed out to them with severity ratings, along with notes about why their answer is risky and what can be done to mitigate it. When the questionnaire is opened by the vendor, the status within UpGuard changes to “in progress,” so you can better understand the questionnaire workflow. Vendors can access a read- only version of completed questionnaires at any time by using a link provided to them in email. Stored and Recorded TOTAL VENDOR RISK ANALYSIS IN ONE PLACE Vendor Contacts Create email contacts for each vendor within UpGuard to track contact points for questionnaires and other communication. Questionnaires are sent per contact, so different questionnaires can be given to different people at the same vendor if, for example, different teams handle web applications and physical security. This granularity ensures that everybody does only the necessary work relevant to the relationship at hand. Questionnaire Results Completed questionnaires are stored in UpGuard for each vendor, and available for review at any time. When viewing a completed questionnaire, the same feedback given to the vendor is available for review, so the risks of that vendor can be better understood, along with what it takes to fix them. Answers that don’t meet security best practices or otherwise introduce cyber risk are clearly flagged and categorized into three severity levels. External Assessment UpGuard CyberRisk performs continuous external assessment of all internet facing domains for all vendors to ensure up to date risk profiles. Every vendor is ranked using CSTAR, UpGuard’s risk scoring engine, and given a score between 0-950, like a credit score. The score provides the high level overview of vendor risk, while the CyberRisk interface can drill down into details, and offer suggestions on how to remediate problems. Recorded and Tracked Over Time UpGuard acts as an automated system of record for vendor security assessments and third party due diligence. In the event of a third party breach or data exposure, these assessments can be used in forensics to understand vendor claims and practices. UpGuard tracks vendors over time, showing the trends and trajectory of their risk profile. By retaining questionnaires for the entirety of the vendor relationship, UpGuard is able to detect variance in vendor status, so that changes in a vendor’s reported practices and policies don’t go undetected.
  • 5. 5 Auto-Renewal Manual Renewal is Unsustainable While an initial questionnaire is crucial to determine whether a vendor relationship is feasible, refreshing questionnaires at regular intervals helps ensure that the most up to date information is available, and that changes to the initial acceptable questionnaire are noted and understood. But renewing questionnaires at scale requires a massive amount of work and documentation, most of which goes undone, as tedious due diligence tends to fall to the bottom of the priority list when things are hectic— even when compliance regulations require regular reassessment. How UpGuard Helps UpGuard handles questionnaire renewal automatically, keeping track of which vendors need to be renewed, and automatically sending the selected questionnaires to the appropriate contact. Renewals are stored alongside originals so the full documentation trail is available for each vendor, and changes in policy can be mapped out easily. UpGuard will also automatically remind vendors to complete their assessments on a regular schedule, to help move the process along to completion without manual intervention. Conclusion Managing third and fourth party cyber risk shouldn’t be difficult. In fact, it can’t be difficult to function effectively, especially at scale. UpGuard consolidates and automates the vendor assessment process to document, understand, and explain the possible ways in which an organization’s data and technology can be damaged by third parties. By performing a comprehensive technical assessment and providing integrated questionnaire services, UpGuard allows vendors to be managed at scale without special technical knowledge, while providing technical users with the details they need to make better decisions.
  • 6. 6 Businesses depend on trust, but breaches and outages erode that trust. UpGuard is the world’s first cyber resilience platform, designed to proactively assess and manage the business risks posed by technology. UpGuard gathers complete information across every digital surface, stores it in a single, searchable repository, and provides continuous validation and insightful visualizations so companies can make informed decisions. 909 San Rafael Ave. Mountain View, CA 94043 +1 888 882 3223 www.UpGuard.com © 2017 UpGuard, Inc. All rights reserved. UpGuard and the UpGuard logo are registered trademarks of UpGuard, Inc. All other products or services mentioned herein are trademarks of their respective companies. Information subject to change without notice.