The organization agrees upon and implements a common information security risk management procedure and processes with stakeholders.
The organization should seek to integrate third-party risk management into its overall information security risk management. This should involve:
A designated responsible person actively monitors the supplier's activities and services to ensure compliance with the security terms of the contracts and the proper management of security incidents.
Monitoring includes the following:
The organization has defined the certifications or standards required of key partners. Commonly recognized standards related to cyber security include:
Certifications required from partners can make organization's own partner management more efficient and provide good evidence of a particular level of security or privacy of the partner.