SlideShare a Scribd company logo
www.infosectrain.com | www.azpirantz.com
Vendor
Management
Policy
Vendor
Management
Policy
www.infosectrain.com | www.azpirantz.com
Revision History
Version
Author
Description of Changes
Release Date
1
XYZ Information Security Manager
XYZ
29/01/2025
:
:
:
:
Version
Author
Reviewed by
Approved by
1
XYZ Information Security Manager
XYZ CTO (Chief Technology Of๏ฌcer)
Board of Directors
:
:
:
:
www.infosectrain.com | www.azpirantz.com
Purpose
Scope
Roles and Responsibilities
Framework
Vendor selection criteria
Onboarding
Vendor Categorization
Offboarding and Termination
Compliance and Enforcement
Policy review and maintenance
04
05
06
07
07
07
08
08
09
10
Table of Contents
04
www.infosectrain.com | www.azpirantz.com
Purpose
The purpose of this Vendor Management
Policy is to establish a framework for
selecting, onboarding, monitoring, and
terminating relationships with vendors to
minimize risks, ensure compliance with
applicable regulations, and safeguard
organizational resources and data.
05
www.infosectrain.com | www.azpirantz.com
Scope
This policy applies to all employees,
departments, and business units of XYZ
company that engage with vendors, suppliers,
contractors, service providers, and third-party
organizations. It covers all vendor interactions,
including procurement, onboarding,
compliance, and termination.
06
www.infosectrain.com | www.azpirantz.com
Roles and Responsibilities
TPRM shall be responsible for
maintaining the vendor inventory.
Responsible for conducting the
security assessments before
onboarding any vendor and
monitoring periodic review
of the vendors.
TPRM shall be responsible for
the development and update
of the vendor management
framework.
Business unit heads shall be
responsible for the vendor
requirements and approval of
vendor selection as well as their
onboarding.
Vendor Manger shall oversee the
entire vendor lifecycle and
manage the vendor system
access.
3.1 TPRM or Third
Party Risk Management
3.2 Business Unit
Heads
3.3 Vendor Manager
07
www.infosectrain.com | www.azpirantz.com
Framework
4.1 Vendor Selection Criteria
Criteria shall be based on business requirements and needs, compliance with regulatory
standards and certi๏ฌcations and industry reputation.
Conduct a comprehensive vendor risk assessment, including background veri๏ฌcation, review
of past performance and legal history.
4.2 Onboarding
Collect necessary documentation including business registration, and regulatory compliance
certi๏ฌcations (ISO 27001, SOC 2, GDPR compliance).
Formalize contractual agreements like Non-Disclosure Agreements (NDAs), Service-Level
Agreements (SLAs).
08
4.3 Vendor Categorization
Vendors shall be categorized into three levels
High: Vendors shall be categorized as high, if they can cause signi๏ฌcant ๏ฌnancial loss or can
lead to business disruptions beyond 24 hours. Examples: cloud service providers, payment
processors, data centres.
Medium: Vendors shall be categorized as medium, if they support business functions but do not
directly impact core operations and if the disruption time is not more than 24 hours. Examples:
IT support providers, HR outsourcing ๏ฌrms, marketing agencies.
Low: Vendors shall be categorized as low, if they have minimal or no access to sensitive data
and provide non-critical services with low business impact. Examples: of๏ฌce supply vendors,
catering services, cleaning companies.
4.4 Offboarding and Termination
Revoke all system and network access granted to the vendor and retrieve company-issued assets
Verify the destruction of organizational data and update vendor records/inventory to re๏ฌ‚ect
termination status.
Conduct a ๏ฌnal compliance review and risk assessment, if applicable to the vendor.
09
www.infosectrain.com | www.azpirantz.com
Compliance and Enforcement
Vendors are required to comply with contractual
and policy requirements; non-compliance may
lead to contract termination and legal action.
10
www.infosectrain.com | www.azpirantz.com
Policy Review and Maintenance
This policy shall be reviewed at least annually or in
response to signi๏ฌcant regulatory changes and any
modi๏ฌcations or updates must be approved by
senior management.
Authored by: Dinesh

More Related Content

PDF
TrustArc Webinar - How to Build a Vendor Risk Management Program
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PDF
Vendor Risk Management - Find It Before It Finds You
PDF
How your vendor master file is critical to governance, risk management and co...
ย 
PDF
Cyber Security Vendor Risk Management /Supply Chain Risk Management
TrustArc Webinar - How to Build a Vendor Risk Management Program
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Risk Management - Find It Before It Finds You
How your vendor master file is critical to governance, risk management and co...
ย 
Cyber Security Vendor Risk Management /Supply Chain Risk Management

Similar to ๐•๐ž๐ง๐๐จ๐ซ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ ๐๐จ๐ฅ๐ข๐œ๐ฒ (20)

PPT
Vendormaster Controls in Accounts Payble
PPTX
Privacy & Security Controls In Vendor Management Al Raymond
PDF
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdf
PPTX
type of Vendor management in civil engineering
PPTX
Vendor Management for PCI DSS, HIPAA, and FFIEC
DOCX
Vendor Management - An Overview (Project File)
PPTX
Ivanti Threat Thursday for January 23
ย 
PPT
Vendor Management - Compliance Checklist Manifesto Series
PPTX
Vendor management using COBIT 5
PPT
Outsourcing Security Management
PPTX
00025-01-vendor-management-powerpoint-template-16x9-1.pptx
PPTX
Vendor_Mgmt_101_IIMC_v2
PPTX
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
PDF
2015 WACHA Hot Regulatory Exam Issues 03202015
PPT
Danforth Intl Presentation
PDF
Cobre - Gestiรณn de Activos โ€“ Guรญa para la aplicaciรณn de la norma 55001
PPT
What the Cloud Vendors Don't Want You to Know
PDF
Vendor Management Best Practices: Is Your Program Up to Par?
ย 
PPTX
Supply Chain and Third-Party Risks During COVID-19
PDF
Cybersecurity Best Practices for 3rd Party Supply Chain
Vendormaster Controls in Accounts Payble
Privacy & Security Controls In Vendor Management Al Raymond
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdf
type of Vendor management in civil engineering
Vendor Management for PCI DSS, HIPAA, and FFIEC
Vendor Management - An Overview (Project File)
Ivanti Threat Thursday for January 23
ย 
Vendor Management - Compliance Checklist Manifesto Series
Vendor management using COBIT 5
Outsourcing Security Management
00025-01-vendor-management-powerpoint-template-16x9-1.pptx
Vendor_Mgmt_101_IIMC_v2
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
2015 WACHA Hot Regulatory Exam Issues 03202015
Danforth Intl Presentation
Cobre - Gestiรณn de Activos โ€“ Guรญa para la aplicaciรณn de la norma 55001
What the Cloud Vendors Don't Want You to Know
Vendor Management Best Practices: Is Your Program Up to Par?
ย 
Supply Chain and Third-Party Risks During COVID-19
Cybersecurity Best Practices for 3rd Party Supply Chain
Ad

More from InfosecTrain (20)

PDF
Top Wireless Attacks and how to prevent them
PDF
Which access Control Mechanism is Best for The Cloud
PDF
Top compTIA Security+ Exam Practice Questions and Answers
PDF
CISSP Certification Exam Preparation Guide
PDF
๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐ƒ๐ž๐ฏ๐’๐ž๐œ๐Ž๐ฉ๐ฌ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ
PDF
Is Your Organization GDPR-Compliant ? | GDPR Assesment Checklist
PDF
50 Most Asked Interview Questions for DPO
PDF
RBI Controls Sheet Audit Checklist-Stay Audit-Ready with RBI Compliance
PDF
Ready to Ace Your Cloud Security Interview.
PDF
Proactive Threat Hunting: Neutralize Threats Before They Strike
PDF
Application Layer Protocols: Are you Secure?
PDF
CISSP Domain 7: Security Operations โ€“ A Comprehensive Overview
PDF
InfosecTrain to Host FREE Cybersecurity Workshop.pdf
PDF
CISSP Exam Practice Domai 1 to 6 ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐ญ๐ก๐ž ๐ญ๐จ๐ฉ ๐ฉ๐ซ๐š๐œ๐ญ๐ข๐œ๐ž ๐ช๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ๐จ๐ซ ๐ƒ๐จ๐ฆ๐š๐ข๐ง๐ฌ
PDF
Top IP Commands for Windows : Boost your network troubleshooting skills with ...
PDF
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ” ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ฌ๐ฌ๐ž๐ฌ๐ฌ๐ฆ๐ž๐ง๐ญ ๐š๐ง๐ ๐“๐ž๐ฌ๐ญ๐ข๐ง๐ .pdf
PDF
Unveiling the Key Highlights from Budget 2025-26 (India).pdf
PDF
Kicking off data Privacy Week with Key Insights on New DPDP Rules!
PDF
Unlock Your Career Potential with Exclusive Free Webinars & Bootcamps!
PDF
Unlocking Ethical Hacking: Protecting Digital Assets
Top Wireless Attacks and how to prevent them
Which access Control Mechanism is Best for The Cloud
Top compTIA Security+ Exam Practice Questions and Answers
CISSP Certification Exam Preparation Guide
๐“๐จ๐ฉ ๐Ÿ๐ŸŽ ๐ƒ๐ž๐ฏ๐’๐ž๐œ๐Ž๐ฉ๐ฌ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ
Is Your Organization GDPR-Compliant ? | GDPR Assesment Checklist
50 Most Asked Interview Questions for DPO
RBI Controls Sheet Audit Checklist-Stay Audit-Ready with RBI Compliance
Ready to Ace Your Cloud Security Interview.
Proactive Threat Hunting: Neutralize Threats Before They Strike
Application Layer Protocols: Are you Secure?
CISSP Domain 7: Security Operations โ€“ A Comprehensive Overview
InfosecTrain to Host FREE Cybersecurity Workshop.pdf
CISSP Exam Practice Domai 1 to 6 ๐Œ๐š๐ฌ๐ญ๐ž๐ซ ๐ญ๐ก๐ž ๐ญ๐จ๐ฉ ๐ฉ๐ซ๐š๐œ๐ญ๐ข๐œ๐ž ๐ช๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ ๐Ÿ๐จ๐ซ ๐ƒ๐จ๐ฆ๐š๐ข๐ง๐ฌ
Top IP Commands for Windows : Boost your network troubleshooting skills with ...
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ” ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ฌ๐ฌ๐ž๐ฌ๐ฌ๐ฆ๐ž๐ง๐ญ ๐š๐ง๐ ๐“๐ž๐ฌ๐ญ๐ข๐ง๐ .pdf
Unveiling the Key Highlights from Budget 2025-26 (India).pdf
Kicking off data Privacy Week with Key Insights on New DPDP Rules!
Unlock Your Career Potential with Exclusive Free Webinars & Bootcamps!
Unlocking Ethical Hacking: Protecting Digital Assets
Ad

Recently uploaded (20)

PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
RMMM.pdf make it easy to upload and study
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
ย 
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
ุงุญูŠุงุก ุงู„ุณุงุฏุณ ุงู„ุนู„ู…ูŠ - ุงู„ูุตู„ ุงู„ุซุงู„ุซ (ุงู„ุชูƒุงุซุฑ) ู…ู†ู‡ุฌ ู…ุชู…ูŠุฒูŠู†/ูƒู„ูŠุฉ ุจุบุฏุงุฏ/ู…ูˆู‡ูˆุจูŠู†
ย 
PPTX
Cell Types and Its function , kingdom of life
PDF
Complications of Minimal Access Surgery at WLH
PPTX
History, Philosophy and sociology of education (1).pptx
ย 
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
IGGE1 Understanding the Self1234567891011
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Computing-Curriculum for Schools in Ghana
PDF
Classroom Observation Tools for Teachers
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy โ€“ Electronic Transition...
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
RMMM.pdf make it easy to upload and study
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
ย 
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
ุงุญูŠุงุก ุงู„ุณุงุฏุณ ุงู„ุนู„ู…ูŠ - ุงู„ูุตู„ ุงู„ุซุงู„ุซ (ุงู„ุชูƒุงุซุฑ) ู…ู†ู‡ุฌ ู…ุชู…ูŠุฒูŠู†/ูƒู„ูŠุฉ ุจุบุฏุงุฏ/ู…ูˆู‡ูˆุจูŠู†
ย 
Cell Types and Its function , kingdom of life
Complications of Minimal Access Surgery at WLH
History, Philosophy and sociology of education (1).pptx
ย 
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Practical Manual AGRO-233 Principles and Practices of Natural Farming
IGGE1 Understanding the Self1234567891011
A systematic review of self-coping strategies used by university students to ...
Computing-Curriculum for Schools in Ghana
Classroom Observation Tools for Teachers
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy โ€“ Electronic Transition...
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
UNIT III MENTAL HEALTH NURSING ASSESSMENT
LDMMIA Reiki Yoga Finals Review Spring Summer
Paper A Mock Exam 9_ Attempt review.pdf.

๐•๐ž๐ง๐๐จ๐ซ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ ๐๐จ๐ฅ๐ข๐œ๐ฒ

  • 2. www.infosectrain.com | www.azpirantz.com Revision History Version Author Description of Changes Release Date 1 XYZ Information Security Manager XYZ 29/01/2025 : : : : Version Author Reviewed by Approved by 1 XYZ Information Security Manager XYZ CTO (Chief Technology Of๏ฌcer) Board of Directors : : : :
  • 3. www.infosectrain.com | www.azpirantz.com Purpose Scope Roles and Responsibilities Framework Vendor selection criteria Onboarding Vendor Categorization Offboarding and Termination Compliance and Enforcement Policy review and maintenance 04 05 06 07 07 07 08 08 09 10 Table of Contents
  • 4. 04 www.infosectrain.com | www.azpirantz.com Purpose The purpose of this Vendor Management Policy is to establish a framework for selecting, onboarding, monitoring, and terminating relationships with vendors to minimize risks, ensure compliance with applicable regulations, and safeguard organizational resources and data.
  • 5. 05 www.infosectrain.com | www.azpirantz.com Scope This policy applies to all employees, departments, and business units of XYZ company that engage with vendors, suppliers, contractors, service providers, and third-party organizations. It covers all vendor interactions, including procurement, onboarding, compliance, and termination.
  • 6. 06 www.infosectrain.com | www.azpirantz.com Roles and Responsibilities TPRM shall be responsible for maintaining the vendor inventory. Responsible for conducting the security assessments before onboarding any vendor and monitoring periodic review of the vendors. TPRM shall be responsible for the development and update of the vendor management framework. Business unit heads shall be responsible for the vendor requirements and approval of vendor selection as well as their onboarding. Vendor Manger shall oversee the entire vendor lifecycle and manage the vendor system access. 3.1 TPRM or Third Party Risk Management 3.2 Business Unit Heads 3.3 Vendor Manager
  • 7. 07 www.infosectrain.com | www.azpirantz.com Framework 4.1 Vendor Selection Criteria Criteria shall be based on business requirements and needs, compliance with regulatory standards and certi๏ฌcations and industry reputation. Conduct a comprehensive vendor risk assessment, including background veri๏ฌcation, review of past performance and legal history. 4.2 Onboarding Collect necessary documentation including business registration, and regulatory compliance certi๏ฌcations (ISO 27001, SOC 2, GDPR compliance). Formalize contractual agreements like Non-Disclosure Agreements (NDAs), Service-Level Agreements (SLAs).
  • 8. 08 4.3 Vendor Categorization Vendors shall be categorized into three levels High: Vendors shall be categorized as high, if they can cause signi๏ฌcant ๏ฌnancial loss or can lead to business disruptions beyond 24 hours. Examples: cloud service providers, payment processors, data centres. Medium: Vendors shall be categorized as medium, if they support business functions but do not directly impact core operations and if the disruption time is not more than 24 hours. Examples: IT support providers, HR outsourcing ๏ฌrms, marketing agencies. Low: Vendors shall be categorized as low, if they have minimal or no access to sensitive data and provide non-critical services with low business impact. Examples: of๏ฌce supply vendors, catering services, cleaning companies. 4.4 Offboarding and Termination Revoke all system and network access granted to the vendor and retrieve company-issued assets Verify the destruction of organizational data and update vendor records/inventory to re๏ฌ‚ect termination status. Conduct a ๏ฌnal compliance review and risk assessment, if applicable to the vendor.
  • 9. 09 www.infosectrain.com | www.azpirantz.com Compliance and Enforcement Vendors are required to comply with contractual and policy requirements; non-compliance may lead to contract termination and legal action.
  • 10. 10 www.infosectrain.com | www.azpirantz.com Policy Review and Maintenance This policy shall be reviewed at least annually or in response to signi๏ฌcant regulatory changes and any modi๏ฌcations or updates must be approved by senior management. Authored by: Dinesh