GV.SC-10.118
Has your organization implemented a formal supplier termination process that addresses data security and system access risks?
Explanation
When supplier relationships end, there are significant risks if access to systems and data isn't properly revoked, or if data transfer/destruction isn't managed securely. This question assesses whether your organization has formalized procedures to mitigate these risks during supplier offboarding. Evidence could include a documented supplier termination procedure that covers: system access revocation timelines, data return/destruction requirements, final security assessments, and contractual obligations enforcement. This might be part of your vendor management policy or a standalone process document with associated checklists.
Implementation Example
Mitigate risks to data and systems created by supplier termination
ID: GV.SC-10.118
Context
- Function
- GV: GOVERN
- Category
- GV.SC: Cybersecurity Supply Chain Risk Management
- Sub-Category
- Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement

