www.infosectrain.com | www.azpirantz.com
Vendor
Management
Policy
Vendor
Management
Policy
www.infosectrain.com | www.azpirantz.com
Revision History
Version
Author
Description of Changes
Release Date
1
XYZ Information Security Manager
XYZ
29/01/2025
:
:
:
:
Version
Author
Reviewed by
Approved by
1
XYZ Information Security Manager
XYZ CTO (Chief Technology Of๏ฌcer)
Board of Directors
:
:
:
:
www.infosectrain.com | www.azpirantz.com
Purpose
Scope
Roles and Responsibilities
Framework
Vendor selection criteria
Onboarding
Vendor Categorization
Offboarding and Termination
Compliance and Enforcement
Policy review and maintenance
04
05
06
07
07
07
08
08
09
10
Table of Contents
04
www.infosectrain.com | www.azpirantz.com
Purpose
The purpose of this Vendor Management
Policy is to establish a framework for
selecting, onboarding, monitoring, and
terminating relationships with vendors to
minimize risks, ensure compliance with
applicable regulations, and safeguard
organizational resources and data.
05
www.infosectrain.com | www.azpirantz.com
Scope
This policy applies to all employees,
departments, and business units of XYZ
company that engage with vendors, suppliers,
contractors, service providers, and third-party
organizations. It covers all vendor interactions,
including procurement, onboarding,
compliance, and termination.
06
www.infosectrain.com | www.azpirantz.com
Roles and Responsibilities
TPRM shall be responsible for
maintaining the vendor inventory.
Responsible for conducting the
security assessments before
onboarding any vendor and
monitoring periodic review
of the vendors.
TPRM shall be responsible for
the development and update
of the vendor management
framework.
Business unit heads shall be
responsible for the vendor
requirements and approval of
vendor selection as well as their
onboarding.
Vendor Manger shall oversee the
entire vendor lifecycle and
manage the vendor system
access.
3.1 TPRM or Third
Party Risk Management
3.2 Business Unit
Heads
3.3 Vendor Manager
07
www.infosectrain.com | www.azpirantz.com
Framework
4.1 Vendor Selection Criteria
Criteria shall be based on business requirements and needs, compliance with regulatory
standards and certi๏ฌcations and industry reputation.
Conduct a comprehensive vendor risk assessment, including background veri๏ฌcation, review
of past performance and legal history.
4.2 Onboarding
Collect necessary documentation including business registration, and regulatory compliance
certi๏ฌcations (ISO 27001, SOC 2, GDPR compliance).
Formalize contractual agreements like Non-Disclosure Agreements (NDAs), Service-Level
Agreements (SLAs).
08
4.3 Vendor Categorization
Vendors shall be categorized into three levels
High: Vendors shall be categorized as high, if they can cause signi๏ฌcant ๏ฌnancial loss or can
lead to business disruptions beyond 24 hours. Examples: cloud service providers, payment
processors, data centres.
Medium: Vendors shall be categorized as medium, if they support business functions but do not
directly impact core operations and if the disruption time is not more than 24 hours. Examples:
IT support providers, HR outsourcing ๏ฌrms, marketing agencies.
Low: Vendors shall be categorized as low, if they have minimal or no access to sensitive data
and provide non-critical services with low business impact. Examples: of๏ฌce supply vendors,
catering services, cleaning companies.
4.4 Offboarding and Termination
Revoke all system and network access granted to the vendor and retrieve company-issued assets
Verify the destruction of organizational data and update vendor records/inventory to re๏ฌ‚ect
termination status.
Conduct a ๏ฌnal compliance review and risk assessment, if applicable to the vendor.
09
www.infosectrain.com | www.azpirantz.com
Compliance and Enforcement
Vendors are required to comply with contractual
and policy requirements; non-compliance may
lead to contract termination and legal action.
10
www.infosectrain.com | www.azpirantz.com
Policy Review and Maintenance
This policy shall be reviewed at least annually or in
response to signi๏ฌcant regulatory changes and any
modi๏ฌcations or updates must be approved by
senior management.
Authored by: Dinesh

More Related Content

PPT
What the Cloud Vendors Don't Want You to Know
PPT
Why Outsource Application Management?
PPT
How to Evaluate a Managed Services Firm
PDF
Soc 2 Compliance.pdf
PDF
Soc 2 Compliance.pdf
PPTX
type of Vendor management in civil engineering
PPTX
Account Right SOC Services brochure.pptx
PDF
Things IT Leaders Must Consider About Cloud Managed Services
What the Cloud Vendors Don't Want You to Know
Why Outsource Application Management?
How to Evaluate a Managed Services Firm
Soc 2 Compliance.pdf
Soc 2 Compliance.pdf
type of Vendor management in civil engineering
Account Right SOC Services brochure.pptx
Things IT Leaders Must Consider About Cloud Managed Services

Similar to ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐•๐ž๐ง๐๐จ๐ซ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ ! (20)

PPTX
How to Choose the Right White Label Managed IT Service Provider for Your Netw...
PDF
Data Protection Compliance In Economically Depressing Times
PDF
Kmicro Cybersecurity Offerings 2020
PPTX
The Future of Statutory Compliance: Trends and Insights.pptx
PDF
Enhancing Trust Through SOC 2 Audit- by ispectra technologies
PPTX
The Ultimate Guide To Choosing The Right Cyber Compliance Services
ย 
DOCX
TRUST SERVICES CRITERIA IN SOC 2 AUDITS- A SAAS COMPLIANCE GUIDE.docx
PDF
Hicx briefing (nov16)
PDF
Mastering IT - A Guide to Managed Services Excellence.pdf
PPTX
Enhancing Trust Through SOC 2 Audit- ispectra
DOCX
Businesses involved in mergers and acquisitions must exercise due di.docx
DOCX
Rules of Behavior
PDF
Legal Transformation and Contract Remediation
PPTX
Cloud & Enterprise IT. Hybrid IT, Coexistence Strategies
PPTX
Top Considerations When Choosing a Remote Infrastructure Management Service P...
DOCX
Vendor Management - An Overview (Project File)
PPTX
How to Choose a Compliance Management Software.pptx
PDF
Intelligence-Driven GRC for Security
ย 
PDF
Security & Compliance Considerations in Staff Augmentation Services for eComm...
PDF
BiznetGio Presentation Business Continuity
How to Choose the Right White Label Managed IT Service Provider for Your Netw...
Data Protection Compliance In Economically Depressing Times
Kmicro Cybersecurity Offerings 2020
The Future of Statutory Compliance: Trends and Insights.pptx
Enhancing Trust Through SOC 2 Audit- by ispectra technologies
The Ultimate Guide To Choosing The Right Cyber Compliance Services
ย 
TRUST SERVICES CRITERIA IN SOC 2 AUDITS- A SAAS COMPLIANCE GUIDE.docx
Hicx briefing (nov16)
Mastering IT - A Guide to Managed Services Excellence.pdf
Enhancing Trust Through SOC 2 Audit- ispectra
Businesses involved in mergers and acquisitions must exercise due di.docx
Rules of Behavior
Legal Transformation and Contract Remediation
Cloud & Enterprise IT. Hybrid IT, Coexistence Strategies
Top Considerations When Choosing a Remote Infrastructure Management Service P...
Vendor Management - An Overview (Project File)
How to Choose a Compliance Management Software.pptx
Intelligence-Driven GRC for Security
ย 
Security & Compliance Considerations in Staff Augmentation Services for eComm...
BiznetGio Presentation Business Continuity
Ad

More from Mansi Kandari (20)

PDF
๐Ÿš€ ๐‡๐จ๐ฐ ๐†๐ž๐ง๐ž๐ซ๐š๐ญ๐ข๐ฏ๐ž ๐€๐ˆ ๐ข๐ฌ ๐“๐ซ๐š๐ง๐ฌ๐Ÿ๐จ๐ซ๐ฆ๐ข๐ง๐  ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ
PDF
๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ ๐’๐œ๐š๐ง๐ง๐ข๐ง๐  ๐“๐จ๐จ๐ฅ๐ฌ
PDF
๐ƒ๐จ ๐˜๐จ๐ฎ ๐Š๐ง๐จ๐ฐ ๐ญ๐ก๐ž ๐‚๐จ๐ซ๐ž ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐จ๐ฅ๐ข๐œ๐ข๐ž๐ฌ ๐“๐ก๐š๐ญ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐˜๐จ๐ฎ๐ซ ๐Ž๐ซ๐ ๐š๐ง๐ข๐ณ๐š๐ญ๐ข๐จ๐ง?
PDF
๐–๐ก๐ข๐œ๐ก ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐‚๐จ๐ง๐ญ๐ซ๐จ๐ฅ ๐Œ๐ž๐œ๐ก๐š๐ง๐ข๐ฌ๐ฆ ๐ข๐ฌ ๐๐ž๐ฌ๐ญ ๐Ÿ๐จ๐ซ ๐ญ๐ก๐ž ๐‚๐ฅ๐จ๐ฎ๐?
PDF
Ready to elevate your cybersecurity career?
PDF
๐Ÿšจ ๐€๐ซ๐ž ๐˜๐จ๐ฎ ๐‘๐ž๐š๐๐ฒ ๐ญ๐จ ๐€๐œ๐ž ๐˜๐จ๐ฎ๐ซ ๐ƒ๐ž๐ฏ๐’๐ž๐œ๐Ž๐ฉ๐ฌ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ? ๐Ÿšจ
PDF
๐Ÿ๐Ÿ’ ๐Œ๐จ๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฆ๐จ๐ง ๐€๐ญ๐ญ๐š๐œ๐ค๐ฌ ๐จ๐ง ๐–๐ž๐›๐ฌ๐ข๐ญ๐ž๐ฌ: ๐€๐ซ๐ž ๐˜๐จ๐ฎ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ž๐?
PDF
๐€๐ฉ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐‹๐š๐ฒ๐ž๐ซ ๐๐ซ๐จ๐ญ๐จ๐œ๐จ๐ฅ๐ฌ
PDF
๐“๐จ๐ฉ ๐ˆ๐ ๐‚๐จ๐ฆ๐ฆ๐š๐ง๐๐ฌ ๐Ÿ๐จ๐ซ ๐–๐ข๐ง๐๐จ๐ฐ๐ฌ
PDF
๐€๐ฅ๐ข๐ ๐ง๐ข๐ง๐  ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐’๐ญ๐ซ๐š๐ญ๐ž๐ ๐ฒ ๐ฐ๐ข๐ญ๐ก ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐†๐จ๐š๐ฅ๐ฌ: ๐๐ฎ๐ข๐ฅ๐๐ข๐ง๐  ๐’๐ญ๐ซ๐จ๐ง๐ ๐ž๐ซ ๐Ž๐ซ๐ ๐š๐ง๐ข๐ณ๐š๐ญ๐ข๐จ๐ง๐ฌ
PDF
๐ƒ๐ซ๐š๐Ÿ๐ญ ๐ƒ๐๐ƒ๐ ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‘๐ž๐ ๐ฎ๐ฅ๐š๐ญ๐ข๐จ๐ง๐ฌ (๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“)
PDF
๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ: ๐“๐ก๐ž ๐…๐จ๐ฎ๐ง๐๐š๐ญ๐ข๐จ๐ง ๐จ๐Ÿ ๐“๐ซ๐ฎ๐ฌ๐ญ & ๐ˆ๐ง๐ญ๐ž๐ ๐ซ๐ข๐ญ๐ฒ
PDF
๐„๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ข๐ง๐  ๐ญ๐ก๐ž ๐’๐Ž๐‚ ๐‚๐š๐ซ๐ž๐ž๐ซ ๐๐š๐ญ๐ก๐ฐ๐š๐ฒ ๐ข๐ง ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“: ๐˜๐จ๐ฎ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‰๐จ๐ฎ๐ซ๐ง๐ž๐ฒ ๐’๐ญ๐š๐ซ๐ญ๐ฌ ๐‡...
PDF
๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ ๐’๐œ๐š๐ง๐ง๐ข๐ง๐  ๐“๐จ๐จ๐ฅ๐ฌ
PDF
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
PDF
๐“๐จ๐ฉ ๐ƒ๐š๐ญ๐š ๐€๐ง๐จ๐ง๐ฒ๐ฆ๐ข๐ณ๐š๐ญ๐ข๐จ๐ง ๐“๐ž๐œ๐ก๐ง๐ข๐ช๐ฎ๐ž๐ฌ
PDF
๐๐ž๐ฑ๐ญ-๐†๐ž๐ง ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐“๐จ๐จ๐ฅ๐ฌ
PDF
๐”๐ง๐ฅ๐จ๐œ๐ค๐ข๐ง๐  ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐๐จ๐ญ๐ž๐ง๐ญ๐ข๐š๐ฅ ๐ฐ๐ข๐ญ๐ก ๐ˆ๐ง๐ฌ๐ข๐ ๐ก๐ญ๐ฌ-๐š๐ฌ-๐š-๐’๐ž๐ซ๐ฏ๐ข๐œ๐ž!
PDF
๐“๐จ๐ฉ ๐Ÿ๐Ÿ ๐Œ๐ฎ๐ฌ๐ญ-๐Š๐ง๐จ๐ฐ ๐„๐ฏ๐ž๐ง๐ญ ๐ˆ๐ƒ๐ฌ ๐Ÿ๐จ๐ซ ๐˜๐จ๐ฎ๐ซ ๐’๐Ž๐‚ ๐’๐ฎ๐œ๐œ๐ž๐ฌ๐ฌ !
PDF
๐‚๐ฒ๐›๐ž๐ซ ๐“๐ฎ๐ซ๐ฆ๐จ๐ข๐ฅ ๐ข๐ง ๐ˆ๐ซ๐š๐ง: Infosectrain
๐Ÿš€ ๐‡๐จ๐ฐ ๐†๐ž๐ง๐ž๐ซ๐š๐ญ๐ข๐ฏ๐ž ๐€๐ˆ ๐ข๐ฌ ๐“๐ซ๐š๐ง๐ฌ๐Ÿ๐จ๐ซ๐ฆ๐ข๐ง๐  ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ
๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ ๐’๐œ๐š๐ง๐ง๐ข๐ง๐  ๐“๐จ๐จ๐ฅ๐ฌ
๐ƒ๐จ ๐˜๐จ๐ฎ ๐Š๐ง๐จ๐ฐ ๐ญ๐ก๐ž ๐‚๐จ๐ซ๐ž ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐จ๐ฅ๐ข๐œ๐ข๐ž๐ฌ ๐“๐ก๐š๐ญ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐˜๐จ๐ฎ๐ซ ๐Ž๐ซ๐ ๐š๐ง๐ข๐ณ๐š๐ญ๐ข๐จ๐ง?
๐–๐ก๐ข๐œ๐ก ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐‚๐จ๐ง๐ญ๐ซ๐จ๐ฅ ๐Œ๐ž๐œ๐ก๐š๐ง๐ข๐ฌ๐ฆ ๐ข๐ฌ ๐๐ž๐ฌ๐ญ ๐Ÿ๐จ๐ซ ๐ญ๐ก๐ž ๐‚๐ฅ๐จ๐ฎ๐?
Ready to elevate your cybersecurity career?
๐Ÿšจ ๐€๐ซ๐ž ๐˜๐จ๐ฎ ๐‘๐ž๐š๐๐ฒ ๐ญ๐จ ๐€๐œ๐ž ๐˜๐จ๐ฎ๐ซ ๐ƒ๐ž๐ฏ๐’๐ž๐œ๐Ž๐ฉ๐ฌ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ? ๐Ÿšจ
๐Ÿ๐Ÿ’ ๐Œ๐จ๐ฌ๐ญ ๐‚๐จ๐ฆ๐ฆ๐จ๐ง ๐€๐ญ๐ญ๐š๐œ๐ค๐ฌ ๐จ๐ง ๐–๐ž๐›๐ฌ๐ข๐ญ๐ž๐ฌ: ๐€๐ซ๐ž ๐˜๐จ๐ฎ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ž๐?
๐€๐ฉ๐ฉ๐ฅ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐‹๐š๐ฒ๐ž๐ซ ๐๐ซ๐จ๐ญ๐จ๐œ๐จ๐ฅ๐ฌ
๐“๐จ๐ฉ ๐ˆ๐ ๐‚๐จ๐ฆ๐ฆ๐š๐ง๐๐ฌ ๐Ÿ๐จ๐ซ ๐–๐ข๐ง๐๐จ๐ฐ๐ฌ
๐€๐ฅ๐ข๐ ๐ง๐ข๐ง๐  ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐’๐ญ๐ซ๐š๐ญ๐ž๐ ๐ฒ ๐ฐ๐ข๐ญ๐ก ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐†๐จ๐š๐ฅ๐ฌ: ๐๐ฎ๐ข๐ฅ๐๐ข๐ง๐  ๐’๐ญ๐ซ๐จ๐ง๐ ๐ž๐ซ ๐Ž๐ซ๐ ๐š๐ง๐ข๐ณ๐š๐ญ๐ข๐จ๐ง๐ฌ
๐ƒ๐ซ๐š๐Ÿ๐ญ ๐ƒ๐๐ƒ๐ ๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐‘๐ž๐ ๐ฎ๐ฅ๐š๐ญ๐ข๐จ๐ง๐ฌ (๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“)
๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ: ๐“๐ก๐ž ๐…๐จ๐ฎ๐ง๐๐š๐ญ๐ข๐จ๐ง ๐จ๐Ÿ ๐“๐ซ๐ฎ๐ฌ๐ญ & ๐ˆ๐ง๐ญ๐ž๐ ๐ซ๐ข๐ญ๐ฒ
๐„๐ฑ๐ฉ๐ฅ๐จ๐ซ๐ข๐ง๐  ๐ญ๐ก๐ž ๐’๐Ž๐‚ ๐‚๐š๐ซ๐ž๐ž๐ซ ๐๐š๐ญ๐ก๐ฐ๐š๐ฒ ๐ข๐ง ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“: ๐˜๐จ๐ฎ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‰๐จ๐ฎ๐ซ๐ง๐ž๐ฒ ๐’๐ญ๐š๐ซ๐ญ๐ฌ ๐‡...
๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ ๐’๐œ๐š๐ง๐ง๐ข๐ง๐  ๐“๐จ๐จ๐ฅ๐ฌ
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
๐“๐จ๐ฉ ๐ƒ๐š๐ญ๐š ๐€๐ง๐จ๐ง๐ฒ๐ฆ๐ข๐ณ๐š๐ญ๐ข๐จ๐ง ๐“๐ž๐œ๐ก๐ง๐ข๐ช๐ฎ๐ž๐ฌ
๐๐ž๐ฑ๐ญ-๐†๐ž๐ง ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐“๐จ๐จ๐ฅ๐ฌ
๐”๐ง๐ฅ๐จ๐œ๐ค๐ข๐ง๐  ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐๐จ๐ญ๐ž๐ง๐ญ๐ข๐š๐ฅ ๐ฐ๐ข๐ญ๐ก ๐ˆ๐ง๐ฌ๐ข๐ ๐ก๐ญ๐ฌ-๐š๐ฌ-๐š-๐’๐ž๐ซ๐ฏ๐ข๐œ๐ž!
๐“๐จ๐ฉ ๐Ÿ๐Ÿ ๐Œ๐ฎ๐ฌ๐ญ-๐Š๐ง๐จ๐ฐ ๐„๐ฏ๐ž๐ง๐ญ ๐ˆ๐ƒ๐ฌ ๐Ÿ๐จ๐ซ ๐˜๐จ๐ฎ๐ซ ๐’๐Ž๐‚ ๐’๐ฎ๐œ๐œ๐ž๐ฌ๐ฌ !
๐‚๐ฒ๐›๐ž๐ซ ๐“๐ฎ๐ซ๐ฆ๐จ๐ข๐ฅ ๐ข๐ง ๐ˆ๐ซ๐š๐ง: Infosectrain
Ad

Recently uploaded (20)

PDF
International_Financial_Reporting_Standa.pdf
PDF
Complications of Minimal Access-Surgery.pdf
PDF
IGGE1 Understanding the Self1234567891011
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
20th Century Theater, Methods, History.pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Trump Administration's workforce development strategy
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
ย 
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
ย 
International_Financial_Reporting_Standa.pdf
Complications of Minimal Access-Surgery.pdf
IGGE1 Understanding the Self1234567891011
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
20th Century Theater, Methods, History.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Environmental Education MCQ BD2EE - Share Source.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Weekly quiz Compilation Jan -July 25.pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Trump Administration's workforce development strategy
Computer Architecture Input Output Memory.pptx
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
ย 
FORM 1 BIOLOGY MIND MAPS and their schemes
ย 

๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐•๐ž๐ง๐๐จ๐ซ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ !

  • 2. www.infosectrain.com | www.azpirantz.com Revision History Version Author Description of Changes Release Date 1 XYZ Information Security Manager XYZ 29/01/2025 : : : : Version Author Reviewed by Approved by 1 XYZ Information Security Manager XYZ CTO (Chief Technology Of๏ฌcer) Board of Directors : : : :
  • 3. www.infosectrain.com | www.azpirantz.com Purpose Scope Roles and Responsibilities Framework Vendor selection criteria Onboarding Vendor Categorization Offboarding and Termination Compliance and Enforcement Policy review and maintenance 04 05 06 07 07 07 08 08 09 10 Table of Contents
  • 4. 04 www.infosectrain.com | www.azpirantz.com Purpose The purpose of this Vendor Management Policy is to establish a framework for selecting, onboarding, monitoring, and terminating relationships with vendors to minimize risks, ensure compliance with applicable regulations, and safeguard organizational resources and data.
  • 5. 05 www.infosectrain.com | www.azpirantz.com Scope This policy applies to all employees, departments, and business units of XYZ company that engage with vendors, suppliers, contractors, service providers, and third-party organizations. It covers all vendor interactions, including procurement, onboarding, compliance, and termination.
  • 6. 06 www.infosectrain.com | www.azpirantz.com Roles and Responsibilities TPRM shall be responsible for maintaining the vendor inventory. Responsible for conducting the security assessments before onboarding any vendor and monitoring periodic review of the vendors. TPRM shall be responsible for the development and update of the vendor management framework. Business unit heads shall be responsible for the vendor requirements and approval of vendor selection as well as their onboarding. Vendor Manger shall oversee the entire vendor lifecycle and manage the vendor system access. 3.1 TPRM or Third Party Risk Management 3.2 Business Unit Heads 3.3 Vendor Manager
  • 7. 07 www.infosectrain.com | www.azpirantz.com Framework 4.1 Vendor Selection Criteria Criteria shall be based on business requirements and needs, compliance with regulatory standards and certi๏ฌcations and industry reputation. Conduct a comprehensive vendor risk assessment, including background veri๏ฌcation, review of past performance and legal history. 4.2 Onboarding Collect necessary documentation including business registration, and regulatory compliance certi๏ฌcations (ISO 27001, SOC 2, GDPR compliance). Formalize contractual agreements like Non-Disclosure Agreements (NDAs), Service-Level Agreements (SLAs).
  • 8. 08 4.3 Vendor Categorization Vendors shall be categorized into three levels High: Vendors shall be categorized as high, if they can cause signi๏ฌcant ๏ฌnancial loss or can lead to business disruptions beyond 24 hours. Examples: cloud service providers, payment processors, data centres. Medium: Vendors shall be categorized as medium, if they support business functions but do not directly impact core operations and if the disruption time is not more than 24 hours. Examples: IT support providers, HR outsourcing ๏ฌrms, marketing agencies. Low: Vendors shall be categorized as low, if they have minimal or no access to sensitive data and provide non-critical services with low business impact. Examples: of๏ฌce supply vendors, catering services, cleaning companies. 4.4 Offboarding and Termination Revoke all system and network access granted to the vendor and retrieve company-issued assets Verify the destruction of organizational data and update vendor records/inventory to re๏ฌ‚ect termination status. Conduct a ๏ฌnal compliance review and risk assessment, if applicable to the vendor.
  • 9. 09 www.infosectrain.com | www.azpirantz.com Compliance and Enforcement Vendors are required to comply with contractual and policy requirements; non-compliance may lead to contract termination and legal action.
  • 10. 10 www.infosectrain.com | www.azpirantz.com Policy Review and Maintenance This policy shall be reviewed at least annually or in response to signi๏ฌcant regulatory changes and any modi๏ฌcations or updates must be approved by senior management. Authored by: Dinesh