Iso 27002 Audit Sample15
Iso 27002 Audit Sample15
Iso 27002 Audit Sample15
CTRL
Do you use your supplier access policy to document your access controls?
GUIDE
GUIDE
Did you identify the types of suppliers that will be allowed to have access?
Did you describe the information that each type of supplier may access?
Do you clarify your risk mitigation requirements and the risk mitigation
expectations that your organizations suppliers must comply with?
CTRL
CTRL
CTRL
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
Did you describe specific access controls for each type of supplier?
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
ORGANIZATION:
YOUR LOCATION:
COMPLETED BY:
DATE COMPLETED:
REVIEWED BY:
DATE REVIEWED:
APR 2014
PART 15
EDITION 1.0
PAGE 121
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
Did you establish processes and procedures for each type of supplier?
GUIDE
Did you establish processes and procedures for each type of access?
GUIDE
GUIDE
GUIDE
ORGANIZATION:
YOUR LOCATION:
COMPLETED BY:
DATE COMPLETED:
REVIEWED BY:
DATE REVIEWED:
APR 2014
PART 15
EDITION 1.0
PAGE 122
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
CTRL
CTRL
CTRL
CTRL
CTRL
CTRL
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
ORGANIZATION:
YOUR LOCATION:
COMPLETED BY:
DATE COMPLETED:
REVIEWED BY:
DATE REVIEWED:
APR 2014
PART 15
EDITION 1.0
PAGE 123
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
ORGANIZATION:
YOUR LOCATION:
COMPLETED BY:
DATE COMPLETED:
REVIEWED BY:
DATE REVIEWED:
APR 2014
PART 15
EDITION 1.0
PAGE 124
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
Do you describe the supplier audits that you plan to carry out?
GUIDE
GUIDE
GUIDE
GUIDE
Do you document the security agreements you have with each supplier?
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
ORGANIZATION:
YOUR LOCATION:
COMPLETED BY:
DATE COMPLETED:
REVIEWED BY:
DATE REVIEWED:
APR 2014
PART 15
EDITION 1.0
PAGE 125
15.1.3 EXPECT SUPPLIERS TO DEAL WITH THEIR OWN SUPPLY CHAIN SECURITY RISKS
CTRL
CTRL
GUIDE
Do you expect your suppliers to control their own supply chain risks?
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
Do you clarify the requirements that your suppliers suppliers must meet?
Do you ask them to protect the technologies that you depend upon?
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
Do you ask them to ensure that the origin of items can be traced?
GUIDE
GUIDE
GUIDE
ORGANIZATION:
YOUR LOCATION:
COMPLETED BY:
DATE COMPLETED:
REVIEWED BY:
DATE REVIEWED:
APR 2014
PART 15
EDITION 1.0
PAGE 126
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
CTRL
CTRL
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
ORGANIZATION:
YOUR LOCATION:
COMPLETED BY:
DATE COMPLETED:
REVIEWED BY:
DATE REVIEWED:
APR 2014
PART 15
EDITION 1.0
PAGE 127
Do you use your process to ensure that suppliers can provide services?
GUIDE
Do you verify that services can be provided after big disasters (17)?
GUIDE
GUIDE
Do you verify that security incidents and issues are well managed?
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
ORGANIZATION:
YOUR LOCATION:
COMPLETED BY:
DATE COMPLETED:
REVIEWED BY:
DATE REVIEWED:
APR 2014
PART 15
EDITION 1.0
PAGE 128
GUIDE
GUIDE
GUIDE
Do you review the relationship suppliers have with their own suppliers?
CTRL
CTRL
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
CTRL
CTRL
ORGANIZATION:
YOUR LOCATION:
COMPLETED BY:
DATE COMPLETED:
REVIEWED BY:
DATE REVIEWED:
APR 2014
PART 15
EDITION 1.0
PAGE 129
CTRL
CTRL
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
Do you manage and control the use of new technologies and techniques?
GUIDE
Do you manage and control the use of new products and new versions?
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
GUIDE
Answer each of the above questions. Three answers are possible: Y (yes), N (no), and X (eXclude). Y means you're in compliance,
N means you're not in compliance, while X means that this question can be excluded because its not applicable in your situation.
Y answers and X answers require no further action, while N answers point to security practices that need to be followed and
security controls that need to be implemented. Also, please use the column on the right to record your notes, and in the spaces
below, enter the name and location of your organization, who completed this page, who reviewed it, and the dates.
ORGANIZATION:
YOUR LOCATION:
COMPLETED BY:
DATE COMPLETED:
REVIEWED BY:
DATE REVIEWED:
APR 2014
PART 15
EDITION 1.0
PAGE 130