GV.SC-10.115

Does your organization have a process to promptly deactivate supplier access to systems and resources when it is no longer required?

Explanation

Maintaining active access for suppliers after their engagement has ended creates unnecessary security risks. This includes ensuring that temporary vendor accounts, VPN access, cloud resource permissions, and physical access credentials are revoked immediately upon project completion or contract termination. Evidence could include a documented offboarding procedure specific to suppliers, access review logs showing timely deactivation of supplier accounts, or automated notifications/tickets that trigger when supplier engagements end. A comprehensive supplier access management policy with clear timelines for deactivation would also serve as supporting evidence.

Implementation Example

Verify that supplier access to organization resources is deactivated promptly when it is no longer needed

ID: GV.SC-10.115

Context

Function
GV: GOVERN
Category
GV.SC: Cybersecurity Supply Chain Risk Management
Sub-Category
Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron