GV.SC-07.099
Does your organization have a formal process to collect and evaluate evidence of third-party compliance with contractual cybersecurity requirements?
Explanation
This question assesses whether your organization systematically verifies that third parties are meeting the cybersecurity requirements specified in contracts. This includes collecting and evaluating documentation such as self-attestations, warranties, certifications (like SOC 2, ISO 27001), audit reports, and security questionnaire responses from vendors and partners. Evidence of fulfillment could include a documented third-party compliance verification process, a vendor management system that tracks compliance artifacts, sample compliance review reports, or a register of third-party certifications with expiration dates and compliance status.
Implementation Example
Evaluate third parties' evidence of compliance with contractual cybersecurity requirements, such as self-attestations, warranties, certifications, and other artifacts
ID: GV.SC-07.099
Context
- Function
- GV: GOVERN
- Category
- GV.SC: Cybersecurity Supply Chain Risk Management
- Sub-Category
- The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship

