{"id":4516,"date":"2014-06-30T18:48:21","date_gmt":"2014-06-30T18:48:21","guid":{"rendered":"https:\/\/multiacademstg.wpengine.com\/27001academy\/blog\/014\/06\/30\/6-step-process-for-handling-supplier-security-according-to-iso-27001\/"},"modified":"2025-07-10T08:34:17","modified_gmt":"2025-07-10T08:34:17","slug":"6-step-process-for-handling-supplier-security-according-to-iso-27001","status":"publish","type":"post","link":"https:\/\/advisera.com\/27001academy\/blog\/2014\/06\/30\/6-step-process-for-handling-supplier-security-according-to-iso-27001\/","title":{"rendered":"6-step process for handling supplier security according to ISO 27001"},"content":{"rendered":"<p><em>Updated: March 22, 2023, according to the ISO 27001 2022 revision.<\/em><\/p>\n<p>Since more and more data is being processed and stored with third parties, the protection of such data is becoming an increasingly significant issue for information security professionals \u2013 it\u2019s no wonder that the new 2022 revision of <a href=\"https:\/\/advisera.com\/27001academy\/what-is-iso-27001\/\" target=\"_blank\" rel=\"noopener noreferrer\">ISO 27001<\/a> has dedicated a set of controls in Annex A to this issue.<\/p>\n<p>But how is it possible to protect the information that is not directly under your control? Here is what ISO 27001 requires when it comes to supplier relationships, supplier information security requirements, and the <a href=\"https:\/\/advisera.com\/27001academy\/iso-27001-documentation-toolkit\/?rel=management-system&amp;doc=information-security-policy\" target=\"_blank\" rel=\"noopener\">information security policy<\/a>.<\/p>\n<div class=\"post-featured\">\n<div class=\"post-featured--title\">The process of handling third parties according to ISO 27001:<\/div>\n<div class=\"post-featured--content\">\n<ol class=\"list-bracket\">\n<li>Risk assessment<\/li>\n<li>Screening agreement<\/li>\n<li>Access control<\/li>\n<li>Monitoring<\/li>\n<li>Termination<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<h2><strong>S<\/strong>upplier relationship and third parties &#8211; <strong>Why is it not only about suppliers?<\/strong><\/h2>\n<p>In supplier relationships, suppliers are the ones that will handle sensitive information of your company most often. For example, if you outsourced the development of your company software, chances are that the software developer will not only learn about your company processes \u2013 they will also have access to your live data, meaning they will probably know what\u2019s most valuable in your company; the same goes if you use cloud services.<\/p>\n<p>But you also may have partners \u2013 e.g., you may develop a new product with some other company, and in this process you share with them your most sensitive research &amp; development data in which you invested lots of years and money.<\/p>\n<p>Then there are customers, too. Let\u2019s say you are participating in a tender, and your potential customer asks you to reveal lots of information about your structure, your employees, your strengths and weaknesses, your intellectual property, pricing, etc.; they may even require a visit where they will do an on-site audit. All this basically means they will access your sensitive information, even if you don\u2019t make any deal with them.<br \/>\n<div id=\"middle-banner\" class=\"banner-shortcode\"><\/div><script>loadMiddleBanner();<\/script><br \/>\n<div id=\"side-banner-trigger\" class=\"banner-shortcode\"><\/div><\/p>\n<h2><strong>The process of supplier relationships and handling third parties <\/strong><\/h2>\n<p>So, how do you protect your information with supplier relationship? Basically, to be compliant with ISO 27001 you should follow this process:<\/p>\n<p><img decoding=\"async\" class=\"alignleft wp-image-21644 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2014\/06\/handling-supplier-27001-article.jpg\" alt=\"The process of handling third parties according to ISO 27001\" width=\"1000\" height=\"180\" srcset=\"\/wp-content\/uploads\/sites\/5\/2014\/06\/handling-supplier-27001-article.jpg 1000w, \/wp-content\/uploads\/sites\/5\/2014\/06\/handling-supplier-27001-article-300x54.jpg 300w, \/wp-content\/uploads\/sites\/5\/2014\/06\/handling-supplier-27001-article-768x138.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Risk assessment (clause 6.1.2).<\/strong> You should assess the risks to confidentiality, integrity and availability of your information if you outsource part of your processes or allow a third party to access your information. For example, during the risk assessment you may realize that some of your information might be exposed to the public and create huge damage, or that some information may be permanently lost. Based on the results of risk assessment, you can decide whether the next steps in this process are necessary or not \u2013 for example, you may not need to perform a background check or insert security clauses for your cafeteria supplier, but you probably will need to do it for your software developer.<\/p>\n<p><strong>Screening (control A.6.1) \/ auditing.<\/strong> This is where you need to perform background checks on your potential suppliers or partners \u2013 the more risks that were identified in the previous step, the more thorough the check needs to be; of course, you always have to make sure you stay within the legal limits when doing this. Available techniques vary widely, and may range from checking the financial information of the company all the way to checking the criminal records of the CEO\/owners of the business. You may also need to audit existing supplier information security controls and processes.<\/p>\n<p><strong>Selecting clauses in the agreement (control A.5.20).<\/strong> Once you know which risks exist and what is the specific situation in the company you have chosen as a supplier\/partner, you can start drafting the <a href=\"https:\/\/advisera.com\/27001academy\/iso-27001-documentation-toolkit\/?rel=information-security-controls&amp;doc=security-clauses-for-suppliers-and-partners\" target=\"_blank\" rel=\"noopener\">security clauses<\/a> that need to be inserted in an agreement. There may be dozens of such clauses, ranging from access control and labelling confidential information, all the way to which awareness trainings are needed and which methods of encryption are to be used.<\/p>\n<p><strong>Access control (control A.8.3).<\/strong> Having an agreement with a supplier does not mean they need to access all of your data \u2013 you have to make sure you give them the access on a \u201cNeed-to-know basis.\u201d That is \u2013 they should access only the data that is required for them to perform their job.<\/p>\n<p><strong>Compliance monitoring (control A.5.22).<\/strong> You may hope that your supplier will comply with all the security clauses in the agreement, but this is very often not the case. This is why you have to monitor and, if necessary, audit whether they comply with all the clauses \u2013 for instance, if they agreed to give access to your data only to a smaller number of their employees, this is something you need to check.<\/p>\n<p><strong>Termination of the agreement.<\/strong> No matter whether your agreement has ended under friendly or less-than-friendly circumstances, you need to make sure all your assets are returned (control A.5.11), and all access rights are removed (A.5.18).<\/p>\n<h2><strong>Focus on what\u2019s important <\/strong>about third-party security<\/h2>\n<p>So, if you are purchasing stationery or printer toner, you are probably going to skip most of this process because your risk assessment will allow you to do so; but when hiring a security consultant, or, for that matter, a cleaning service (because they have access to all your facilities in the off hours), you should carefully perform each of the six steps.<\/p>\n<p>As you probably noticed from the above process, it is quite difficult to develop a one-size-fits-all checklist for checking the security of a supplier \u2013 rather, you should use this process to figure out for yourself what is the most appropriate approach to protect your most valuable information.<\/p>\n<p><em>To see how to handle suppliers securely using a compliance tool, <\/em><a href=\"https:\/\/advisera.com\/conformio\/\" target=\"_blank\" rel=\"noopener\">sign up for a free trial<\/a><em> of Conformio, the leading ISO 27001 compliance software.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Updated: March 22, 2023, according to the ISO 27001 2022 revision. Since more and more data is being processed and stored with third parties, the protection of such data is becoming an increasingly significant issue for information security professionals \u2013 it\u2019s no wonder that the new 2022 revision of ISO 27001 has dedicated a set &#8230;<\/p>\n","protected":false},"author":26,"featured_media":85317,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[381,1643,1901],"class_list":["post-4516","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-iso-27001","tag-supplier-security","tag-third-party"],"acf":[],"_links":{"self":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/4516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/comments?post=4516"}],"version-history":[{"count":2,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/4516\/revisions"}],"predecessor-version":[{"id":104336,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/4516\/revisions\/104336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/media\/85317"}],"wp:attachment":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/media?parent=4516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/categories?post=4516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/tags?post=4516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}