15

Service Provider Management

Develop a process to evaluate service providers who hold sensitive data, or are responsible for an enterprise's critical IT platforms or processes, to ensure these providers are protecting those platforms and data appropriately.

Why Is This Control Critical?

In our modern, connected world, enterprises rely on vendors and partners to help manage their data or rely on third-party infrastructure for core applications or functions. There have been numerous examples where third-party breaches have significantly impacted an enterprise; for example, as early as the late 2000s, payment card compromises were tied to third-party, point-of-sale vendors. More recently, a healthcare enterprise found that data for millions of patients was exposed because a billing services vendor had been compromised. This is not only a technology problem -- legal and regulatory operations within an enterprise must establish and maintain standards for any and all third parties.

Related Policy Templates

Safeguards (7)

ID Title Function IG Checklist Items Evidence
15.1 Establish and Maintain an Inventory of Service Providers Identify
IG1 IG2 IG3
9 7
15.2 Establish and Maintain a Service Provider Management Policy Identify
IG2 IG3
9 7
15.3 Classify Service Providers Identify
IG2 IG3
7 5
15.4 Ensure Service Provider Contracts Include Security Requirements Protect
IG2 IG3
11 9
15.5 Assess Service Providers Identify
IG3
7 5
15.6 Monitor Service Providers Detect
IG3
8 5
15.7 Securely Decommission Service Providers Protect
IG3
7 5

Audit Verification Details

15.1 Establish and Maintain an Inventory of Service Providers
IG1 IG2 IG3
9 items

Establish and maintain an inventory of service providers. The inventory is to list all known service providers, include classification(s), and designate an enterprise contact for each service provider. Review and update the inventory annually, or when significant enterprise changes occur that could impact this Safeguard.

Audit Verification Checklist

Governance

A governing policy or procedure exists, is approved by management, and was reviewed within the last 12 months.

Signed/approved policy document with review date

Roles and responsibilities for this safeguard are formally assigned and communicated.

RACI matrix, role assignment records, or job descriptions

Contracts with third parties include security requirements.

Contract excerpts showing security clauses

Technical

Inventory tool is deployed and all required data fields are populated.

Inventory tool screenshot, exported data with populated fields

Operational

An inventory or catalog is maintained, accurate, and complete.

Inventory export with timestamps showing recent updates

Inventory is reviewed and reconciled on the defined schedule.

Review meeting minutes, sign-off records, or change logs

New assets/items are added to the inventory within the defined onboarding window.

Sample of recently onboarded assets with inventory timestamps

Process exists to identify and remediate unauthorized or unmanaged items.

Exception reports, unauthorized asset remediation records

Third-party service providers are inventoried and risk-assessed.

Vendor inventory, risk assessment reports, security scorecards

Type Evidence Item Frequency
Document Current inventory or catalog documentation Maintained continuously, reviewed quarterly
Document Process/procedure documentation for identification activities Reviewed annually
Technical Asset/software inventory export with required fields populated Exported quarterly for review
Record Inventory review meeting minutes or sign-off Per review cycle
Record Third-party risk assessment reports and scorecards Annually per vendor
Document Vendor contracts with security requirements Per contract cycle
Document Governing policy document (current, approved, communicated) Reviewed annually
15.2 Establish and Maintain a Service Provider Management Policy
IG2 IG3
9 items

Establish and maintain a service provider management policy. Ensure the policy addresses the classification, inventory, assessment, monitoring, and decommissioning of service providers. Review and update the policy annually, or when significant enterprise changes occur that could impact this Safeguard.

Audit Verification Checklist

Governance

A governing policy or procedure exists, is approved by management, and was reviewed within the last 12 months.

Signed/approved policy document with review date

Roles and responsibilities for this safeguard are formally assigned and communicated.

RACI matrix, role assignment records, or job descriptions

Contracts with third parties include security requirements.

Contract excerpts showing security clauses

Technical

Inventory tool is deployed and all required data fields are populated.

Inventory tool screenshot, exported data with populated fields

Operational

An inventory or catalog is maintained, accurate, and complete.

Inventory export with timestamps showing recent updates

Inventory is reviewed and reconciled on the defined schedule.

Review meeting minutes, sign-off records, or change logs

New assets/items are added to the inventory within the defined onboarding window.

Sample of recently onboarded assets with inventory timestamps

Process exists to identify and remediate unauthorized or unmanaged items.

Exception reports, unauthorized asset remediation records

Third-party service providers are inventoried and risk-assessed.

Vendor inventory, risk assessment reports, security scorecards

Type Evidence Item Frequency
Document Current inventory or catalog documentation Maintained continuously, reviewed quarterly
Document Process/procedure documentation for identification activities Reviewed annually
Technical Asset/software inventory export with required fields populated Exported quarterly for review
Record Inventory review meeting minutes or sign-off Per review cycle
Record Third-party risk assessment reports and scorecards Annually per vendor
Document Vendor contracts with security requirements Per contract cycle
Document Governing policy document (current, approved, communicated) Reviewed annually
15.3 Classify Service Providers
IG2 IG3
7 items

Classify service providers. Classification consideration may include one or more characteristics, such as data sensitivity, data volume, availability requirements, applicable regulations, inherent risk, and mitigated risk. Update and review classifications annually, or when significant enterprise changes occur that could impact this Safeguard.

Audit Verification Checklist

Governance

A governing policy or procedure exists, is approved by management, and was reviewed within the last 12 months.

Signed/approved policy document with review date

Roles and responsibilities for this safeguard are formally assigned and communicated.

RACI matrix, role assignment records, or job descriptions

Contracts with third parties include security requirements.

Contract excerpts showing security clauses

Operational

An inventory or catalog is maintained, accurate, and complete.

Inventory export with timestamps showing recent updates

Inventory is reviewed and reconciled on the defined schedule.

Review meeting minutes, sign-off records, or change logs

New assets/items are added to the inventory within the defined onboarding window.

Sample of recently onboarded assets with inventory timestamps

Third-party service providers are inventoried and risk-assessed.

Vendor inventory, risk assessment reports, security scorecards

Type Evidence Item Frequency
Document Current inventory or catalog documentation Maintained continuously, reviewed quarterly
Document Process/procedure documentation for identification activities Reviewed annually
Record Third-party risk assessment reports and scorecards Annually per vendor
Document Vendor contracts with security requirements Per contract cycle
Document Governing policy document (current, approved, communicated) Reviewed annually
15.4 Ensure Service Provider Contracts Include Security Requirements
IG2 IG3
11 items

Ensure service provider contracts include security requirements. Example requirements may include minimum security program requirements, security incident and/or data breach notification and response, data encryption requirements, and data disposal commitments. These security requirements must be consistent with the enterprise’s service provider management policy. Review service provider contracts annually to ensure contracts are not missing security requirements.

Audit Verification Checklist

Governance

A governing policy or procedure exists, is approved by management, and was reviewed within the last 12 months.

Signed/approved policy document with review date

Roles and responsibilities for this safeguard are formally assigned and communicated.

RACI matrix, role assignment records, or job descriptions

Incident response plan is documented, current, and includes escalation paths.

IR plan with review date, escalation contact list

Contracts with third parties include security requirements.

Contract excerpts showing security clauses

Technical

Required protection controls are deployed and configured per the approved baseline.

Configuration exports, screenshots, or compliance scan results

Control effectiveness has been validated through testing.

Test results, validation reports, or scan output

Encryption is applied to all in-scope data at rest and in transit using approved algorithms.

Encryption status reports, TLS scan results, disk encryption audit

Operational

Changes to protection controls follow the change management process.

Change tickets, approval records

Encryption keys are managed per the key management procedure (rotation, storage, access).

Key rotation logs, key management system audit

Post-incident reviews are conducted and findings drive improvements.

Post-incident review reports, corrective action tracking

Third-party service providers are inventoried and risk-assessed.

Vendor inventory, risk assessment reports, security scorecards

Type Evidence Item Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Technical Encryption configuration evidence (disk encryption status, TLS settings) Scanned monthly
Document Key management procedures and key rotation records Reviewed annually
Document Incident response plan and playbooks Reviewed bi-annually
Record Incident reports and post-incident review documentation Per incident
Record Third-party risk assessment reports and scorecards Annually per vendor
Document Vendor contracts with security requirements Per contract cycle
Document Governing policy document (current, approved, communicated) Reviewed annually
15.5 Assess Service Providers
IG3
7 items

Assess service providers consistent with the enterprise’s service provider management policy. Assessment scope may vary based on classification(s), and may include review of standardized assessment reports, such as Service Organization Control 2 (SOC 2) and Payment Card Industry (PCI) Attestation of Compliance (AoC), customized questionnaires, or other appropriately rigorous processes. Reassess service providers annually, at a minimum, or with new and renewed contracts.

Audit Verification Checklist

Governance

A governing policy or procedure exists, is approved by management, and was reviewed within the last 12 months.

Signed/approved policy document with review date

Roles and responsibilities for this safeguard are formally assigned and communicated.

RACI matrix, role assignment records, or job descriptions

Contracts with third parties include security requirements.

Contract excerpts showing security clauses

Operational

An inventory or catalog is maintained, accurate, and complete.

Inventory export with timestamps showing recent updates

Inventory is reviewed and reconciled on the defined schedule.

Review meeting minutes, sign-off records, or change logs

New assets/items are added to the inventory within the defined onboarding window.

Sample of recently onboarded assets with inventory timestamps

Third-party service providers are inventoried and risk-assessed.

Vendor inventory, risk assessment reports, security scorecards

Type Evidence Item Frequency
Document Current inventory or catalog documentation Maintained continuously, reviewed quarterly
Document Process/procedure documentation for identification activities Reviewed annually
Record Third-party risk assessment reports and scorecards Annually per vendor
Document Vendor contracts with security requirements Per contract cycle
Document Governing policy document (current, approved, communicated) Reviewed annually
15.6 Monitor Service Providers
IG3
8 items

Monitor service providers consistent with the enterprise’s service provider management policy. Monitoring may include periodic reassessment of service provider compliance, monitoring service provider release notes, and dark web monitoring.

Audit Verification Checklist

Governance

A governing policy or procedure exists, is approved by management, and was reviewed within the last 12 months.

Signed/approved policy document with review date

Roles and responsibilities for this safeguard are formally assigned and communicated.

RACI matrix, role assignment records, or job descriptions

Contracts with third parties include security requirements.

Contract excerpts showing security clauses

Technical

Detection tools are deployed and actively collecting data.

Dashboard screenshots showing agent/sensor status and data flow

Alerting is configured with defined thresholds and notification channels.

Alert rule configuration exports, notification channel setup

Operational

Alerts are reviewed and triaged within the defined SLA.

Alert response logs, triage records with timestamps

Detection coverage has been tested with simulated events.

Detection test results, purple team exercise reports

Third-party service providers are inventoried and risk-assessed.

Vendor inventory, risk assessment reports, security scorecards

Type Evidence Item Frequency
Technical Detection tool deployment evidence (dashboard screenshots, agent status) Captured monthly
Technical Sample alert/detection output demonstrating capability Captured quarterly
Record Third-party risk assessment reports and scorecards Annually per vendor
Document Vendor contracts with security requirements Per contract cycle
Document Governing policy document (current, approved, communicated) Reviewed annually
15.7 Securely Decommission Service Providers
IG3
7 items

Securely decommission service providers. Example considerations include user and service account deactivation, termination of data flows, and secure disposal of enterprise data within service provider systems.

Audit Verification Checklist

Governance

A governing policy or procedure exists, is approved by management, and was reviewed within the last 12 months.

Signed/approved policy document with review date

Roles and responsibilities for this safeguard are formally assigned and communicated.

RACI matrix, role assignment records, or job descriptions

Contracts with third parties include security requirements.

Contract excerpts showing security clauses

Technical

Required protection controls are deployed and configured per the approved baseline.

Configuration exports, screenshots, or compliance scan results

Control effectiveness has been validated through testing.

Test results, validation reports, or scan output

Operational

Changes to protection controls follow the change management process.

Change tickets, approval records

Third-party service providers are inventoried and risk-assessed.

Vendor inventory, risk assessment reports, security scorecards

Type Evidence Item Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Record Third-party risk assessment reports and scorecards Annually per vendor
Document Vendor contracts with security requirements Per contract cycle
Document Governing policy document (current, approved, communicated) Reviewed annually