GV.SC-02.077

Has your organization established formal rules and protocols for information sharing and reporting with suppliers?

Explanation

This question assesses whether your organization has documented procedures that govern how security information, incidents, vulnerabilities, and updates are shared between your organization and suppliers. These protocols should define what information can be shared, with whom, through which channels, and under what circumstances. Evidence could include a Supplier Information Sharing Policy document, communication protocols outlined in supplier contracts, documented incident reporting procedures for suppliers, or templates for security notifications that flow between your organization and suppliers.

Implementation Example

Establish rules and protocols for information sharing and reporting processes between the organization and its suppliers

ID: GV.SC-02.077

Context

Function
GV: GOVERN
Category
GV.SC: Cybersecurity Supply Chain Risk Management
Sub-Category
Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron