Supply Chain Risk Management: NIST 800-53 Rev. 5 Compliance Checklist
Supply Chain Risk Management: NIST 800-53 Rev. 5 Compliance Checklist
NOVEMBER 2019
NIST COMPLIANCE CHECKLIST
NIST 800-53 details security and privacy controls for federal information systems and
organizations. Industries and organizations across the private sector widely-accept
and rely on NIST publications. Although NIST 800-53 Rev. 5 is still in the draft stage,
organizations should future-proof their supplier risk processes by examining the
publication’s relevant controls.
DISCLAIMER
The contents of this document are subject to revision without notice due to continued
progress in methodology, design, and manufacturing. OneTrust LLC shall have no
liability for any error or damage of any kind resulting from the use of this document.
OneTrust products, content and materials are for informational purposes only and not
for the purpose of providing legal advice. You should contact your attorney to obtain
advice with respect to any particular issue. OneTrust materials do not guarantee
compliance with applicable laws and regulations.
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
YES N
9. Have you established agreements and procedures with entities involved in
the supply chain for the system, system component, or system service for
the notification of supply chain compromises results of assessments or
audits or other specific information?
13. Do you document the selected and implemented supply chain safeguards
in security and privacy plans or supply chain risk management?
8. Do you take specific actions to verify that the interests of certain external
service providers are consistent with and re ect organizational interests?
RIS SSESSMEN
1. Do you conduct a risk assessment, which covers
the likelihood and magnitude of harm, from:
YES N
IN IDEN ND IN ND RE R IN YES N
1. Do you coordinate incident handling activities involving supply
chain events with other organizations involved in the supply chain?
RI RI I N IN RM I N
YES N
S RIN I E ERN R IES
1. Do you develop, document, and disseminate guidelines to specific
personnel or roles for the sharing of personally identifiable information
externally, only for the authorized purposes identified in an applicable
privacy law and/or described in its notices, or for a purpose that is
compatible with those purposes?
N IN EN N YES N
1. Do you coordinate your contingency plan with external
service providers’ contingency plans to ensure that
contingency requirements can be satisfied?
E E MM NI I NS SER I ES YES N
1. Do you obtain alternate telecommunications services from
providers that are separated from primary service providers
to reduce susceptibility to the same threats?
If you find yourself selecting N more than a few times for the questions above
you re not alone
ne rust endorpedia is here to help. Around the world, organizations like yours use OneTrust Vendorpedia to help with the
implementation of controls for NIST 800-53. Our team of experts have analyzed the NIST controls and designed a purpose-built
platform to overcome common supply chain and third-party risk challenges.
Want to learn more about how OneTrust Vendorpedia can help your organization with NIST 800-53? Schedule a demo today
Processor Risk Management
GDPR-Ready Compliance Checklist
NOVEMBER 2019
GDPR-READY CHECKLIST
This checklist outlines the DPR’s key provisions that relate to your organization’s
processors, or your organization’s other third-party related risks. Answer below to find
out if your program is ready for DPR compliance.
DISCLAIMER
The contents of this document are subject to revision without notice due to continued
progress in methodology, design, and manufacturing. OneTrust LLC shall have no
liability for any error or damage of any kind resulting from the use of this document.
OneTrust products, content and materials are for informational purposes only and not
for the purpose of providing legal advice. You should contact your attorney to obtain
advice with respect to any particular issue. OneTrust materials do not guarantee
compliance with applicable laws and regulations.
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
GDPR-READY CHECKLIST | 2
GDPR-READY CHECKLIST
GDPR-READY CHECKLIST | 3
GDPR-READY CHECKLIST
Processors
Note: ‘processor’ means a natural or legal person, public authority, agency
or other body which processes personal data on your organization’s behalf.
General
YES NO
• does not dismiss or penalize the DPO for performing its tasks.
GDPR-READY CHECKLIST | 4
GDPR-READY CHECKLIST
2. Did your organization enter into a binding contract with the processor
(or other legal act under U or Member State law) that establishes the
sub ect-matter and duration of the processing, the nature and purpose
of the processing, the type of personal data and categories of data
sub ects, and your organization’s rights and obligations?
GDPR-READY CHECKLIST | 5
GDPR-READY CHECKLIST
Subprocessors YES NO
1. Does your organization contractually prohibit the processor from
engaging another processor without obtaining your prior specific or
general written authorization?
Records YES NO
1. Does the processor maintain a record of all categories of
processing activities carried out on your organization’s behalf?
2. Does the processor understand its obligation to, and have the ability
to, provide such records to a supervisory authority upon request?
Security YES NO
1. Does the processor implement appropriate technical and organisational
measures to ensure a level of security appropriate to the risk?
2. as the processor taken steps to ensure that any person acting under
its authority who has access to personal data does not process that data
except according to your organization’s instructions, or as required by U
or Member State law?
3. Does the processor understand its obligation to, and have the ability to,
notify you, without undue delay, after becoming aware of a data breach?
GDPR-READY CHECKLIST | 6
Take Your
Next Steps with
If you find yourself selecting “NO” more than a few times for the questions above you re not alone
OneTrust Vendorpedia is here to help. Around the world, organizations like yours use OneTrust Vendorpedia to help
demonstrate compliance with the DPR. Our team of experts have analyzed the requirements of the DPR and designed a
purpose-built platform to address compliance and overcome processor-related challenges.
Want to learn more about how OneTrust Vendorpedia can help your organization demonstrate compliance with the DPR?
Schedule a demo today!
Supplier Risk Management
ISO-Ready for ISO 27001, 27002, and 27701
Compliance Checklist
NOVEMBER 2019
ISO-READY CHECKLIST
The following checklist outlines ISO 27000’s key provisions related to supplier,
processor, and service provider risk management. Answer below to find out if your
third-party risk program is well equipped to meet the controls as documented in
ISO 27001, 27002, and 27701.
Note: Some of the questions within the checklist may not apply to your organization.
Please skip these questions as necessary.
DISCLAIMER
The contents of this document are subject to revision without notice due to continued
progress in methodology, design, and manufacturing. OneTrust LLC shall have no
liability for any error or damage of any kind resulting from the use of this document.
OneTrust products, content and materials are for informational purposes only and not
for the purpose of providing legal advice. You should contact your attorney to obtain
advice with respect to any particular issue. OneTrust materials do not guarantee
compliance with applicable laws and regulations.
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
ISO-READY CHECKLIST | 2
ISO-READY CHECKLIST
SUPPLIERS
General YES NO
1. Do you have policies and mechanisms to
monitor suppliers’ physical or logical access?
Information Security
YES NO
1. Do you identify, define, and document the information security
controls necessary for mitigating the risks associated with supplier
access to your information assets and require the supplier to
implement appropriate controls?
ISO-READY CHECKLIST | 3
ISO-READY CHECKLIST
• Note that such changes may include, among others, the adherence to
information security processes and controls, as well as suppliers’ use
of new technologies or subcontractors.
Development Security
ISO-READY CHECKLIST | 4
ISO-READY CHECKLIST
4. Do you have procedures and mechanisms for informing third parties with
whom you have shared personal data of any modification, withdrawal, or
objections relating to the personal data?
6. Do you have written contracts with processors that require the processors
to implement the applicable controls related to the protection of personal
data in Annex B of ISO 27701?
ISO-READY CHECKLIST | 5
Take Your
Next Steps with
Did you find yourself selecting “NO” more than a few times for the questions above?
You’re not alone.
OneTrust Vendorpedia is here to help. Around the world, organizations like yours use OneTrust Vendorpedia to
help meet ISO 27001, 27001, and 27701 requirements. Our team of experts have analyzed the ISO obligations
and designed a purpose-built platform to address compliance and overcome common third-party risk challenges.
To learn more about how OneTrust Vendorpedia can help your organization, schedule demo today!
Service Provider and Third-Party Risk
CCPA-Ready Compliance Checklist
NOVEMBER 2019
CCPA-READY CHECKLIST
This checklist outlines the CCPA’s key provisions that relate to third-party risk. Answer
the questions on the following pages to find out if your TPRM program is ready for
CCPA compliance.
DIS IMER
The contents of this document are subject to revision without notice due to continued
progress in methodology, design, and manufacturing. OneTrust LLC shall have no
liability for any error or damage of any kind resulting from the use of this document.
OneTrust products, content and materials are for informational purposes only and not
for the purpose of providing legal advice. You should contact your attorney to obtain
advice with respect to any particular issue. OneTrust materials do not guarantee
compliance with applicable laws and regulations.
Copyright © 2019 OneTrust LLC. All rights reserved. Proprietary & Confidential.
CCPA-READY CHECKLIST | 2
CCPA-READY CHECKLIST
Contracts YES NO
3. Do you and your service provider have a written contract that prohibits the
service provider from retaining, using, or disclosing the PI for any purpose
other than for the specific purpose of performing the services specified in
the contract, or as otherwise permitted by the CCPA?
6. Does the contract require the service provider to protect the PI disclosed
to it by implementing and maintaining reasonable security procedures
and practices appropriate to the nature of the information?
CCPA-READY CHECKLIST | 3
CCPA-READY CHECKLIST
General
onsumer Rights
YES NO
1. Right to Disclosure / to Know
CCPA-READY CHECKLIST | 4
Take Your
Ne t Steps with
Did you find yourself selecting “NO” more than a few times for the questions above?
You’re not alone.
OneTrust Vendorpedia is here to help. Around the world, organizations like yours use OneTrust Vendorpedia to help
demonstrate compliance with the CCPA. Our team of experts have analyzed the requirements of the CCPA and designed
a purpose-built platform to address compliance and overcome common service provider and third-party risk challenges.
To learn more about how OneTrust Vendorpedia can help your organization, schedule demo today!
DATASHEET
SSESSMEN S D E DI I EN E
Clarity at Every Stage of the Vendor Engagement Lifecycle,
from Onboarding to Offboarding
• Onboarding Automation, Faster Assessments, Dozens of Templates
• Flexible Reports, Visual Dashboards, 360° Third-Party Visibility
• Mitigation Work ows, Centralized Vendor Risks, Out-of-the- ox Controls
RIS E N E
Thousands of Detailed Vendor Profiles and
Pre-Completed Risk Assessments, Updated Daily
• Risk & Performance Monitoring, Alerts and Evergreen Vendor Data
• Supplier Profiles, Product- evel ranularity, In-Depth Risk Research
• Pre-Completed Assessments (SI ite, CSA CAI , etc.), Compliance Certs
ERED NE R S D ID N E
In-Depth Third-Party Risk & Regulatory Intelligence from 40 In-House Researchers and a Network of 500 Global Lawyers
OneTrust DataGuidance™ intelligence powers Vendorpedia, embedding valuable research directly into the platform to help your
organization implement third-party frameworks, standards, and controls to comply with the laws that matter most. DataGuidance
intelligence is aggregated from authoritative sources, updated on a daily basis, and continually reviewed to alert your team when critical
regulatory changes arise.
dd usiness onte t to Supplier Risks Link your vendors to the IT systems and
business processes they support to add context to risk, visualize lineage diagrams,
and keep your data map up to date
ASSESSMENTS
D E DI I EN E Manage ey ontract erms Scan and report on key contract terms, and manage
certificates, evidence, and vendor documentation in a single repository, as well as
integrate with contract management tools
Monitor Supplier Risks and erformance Get alerts on critical vendor security and
privacy changes, including 4th-party changes, incidents & breaches, all while using
automation to trigger reassessments
RIS et lerted hen Supplier reaches ccur Receive notifications about vendor
E N E breaches and regulatory enforcements, monitored by our in-house security and privacy
team and backed by OneTrust DataGuidance research
oad ssessment Related ork Leverage free risk assessment services performed
by the OneTrust team to chase vendors on your behalf, o oading work and enabling
faster questionnaire completion
Save Money Reallocate Resources Eliminate repetitive tasks, giving your team the
bandwidth to work on high-value projects, all of which is included with your license and
is available at no extra cost
END R SIN
utomate ustom uestionnaire ompletion Empower vendors to autocomplete
SERVICES any questionnaire, even custom ones, to speed up assessment response time for
vendors, free and available for any supplier to use