Software

Gain a 360-degree view of third-party risk by using our SaaS software to centralize, track, automate, assess and report on your vendors. 

Managed Services

Let us handle the manual labor of third-party risk management by collaborating with our experts to reduce the workload and mature your program. 

Overview
Document Collection
Policy/Program Template/Consulting
Virtual Vendor Management Office
Vendor Site Audit

Ongoing Monitoring

Let us handle the manual labor of third-party risk management by collaborating with our experts.

VX LP Sequence USE FOR CORPORATE SITE-thumb
Venminder Exchange

As Venminder completes assessments for clients on new vendors, they are then made available inside the Venminder Exchange for you to preview scores and purchase as you need.

CREATE FREE ACCOUNT

Use Cases

Learn more on how customers are using Venminder to transform their third-party risk management programs. 

Industries

Venminder is used by organizations of all sizes in all industries to mitigate vendor risk and streamline processes

Why Venminder

We focus on the needs of our customers by working closely and creating a collaborative partnership

1.7.2020-what-is-a-third-party-risk-assessment-FEATURED
Sample Vendor Risk Assessments

Venminder experts complete 30,000 vendor risk assessments annually. Download samples to see how outsourcing to Venminder can reduce your workload.

DOWNLOAD SAMPLES

Resources

Trends, best practices and insights to keep you current in your knowledge of third-party risk.

Webinars

Earn CPE credit and stay current on the latest best practices and trends in third-party risk management.  

See Upcoming Webinars

On-Demand Webinars

 

Community

Join a free community dedicated to third-party risk professionals where you can network with your peers. 

Weekly Newsletter

Receive the popular Third Party Thursday newsletter into your inbox every Thursday with the latest and greatest updates.

Subscribe

 

Venminder Samples

Download samples of Venminder's vendor risk assessments and see how we can help reduce the workload. 

resources-whitepaper-state-of-third-party-risk-management-2023
State of Third-Party Risk Management 2023!

Venminder's seventh annual whitepaper provides insight from a variety of surveyed individuals into how organizations manage third-party risk today.

DOWNLOAD NOW

Vendor Information Security Policy: What Should Be Included

2 min read
Featured Image

Strong information security is a vital practice to protect your organization and customers’ data. At its core, information security always prioritizes confidentiality, integrity and availability through the following ways:

  • Confidentiality: Prevents unauthorized disclosure of information
  • Integrity: Protects data from unauthorized modification
  • Availability: Ensures that information is available when needed and only to authorized personnel
Your third-party vendor should have a well-developed information security policy that includes controls that address these key concepts. It's equally important to validate the policy to ensure implementation and review it annually.

Top Requirements of Your Vendor’s Information Security Policy

Let’s delve further into the integral components of a vendor information security policy. A comprehensive information security policy should include the following:

  1. Confidentiality –To guarantee confidentiality, vendor communications channels and media must be properly monitored and controlled to prevent unauthorized access. Your vendor’s information security policy should include steps for ensuring appropriate user logical access. These logical access controls should include key concepts such as password requirements, the principle of least privilege and separation of duties.

    Here is some helpful guidance to obtain this:
     
    • The principle of least privilege means that a user should only have access to the resources needed to perform their defined role. For example, employee personal identifiable information (PII) should only be accessed by an appropriate individual in human resources.
    • Separation of duties prevents a single user from taking both actions of performing a task and approving that it was properly done. A common implementation of this rule is within a software change management program. Developers should not be able to promote their code from a test environment to a production environment on their own.
    • Password requirements should include configuration minimums such as length, character parameters, complexity requirements, etc.
  2. Integrity –This ensures that data isn't modified in  unauthorized ways. To guarantee integrity, vendors should be able to demonstrate that they have controls in place to protect information from unauthorized modification. One way to do this is by ensuring proper input, processing and output controls are in place and documented within the vendor information security policy.
  3. Availability –Information should only be available when needed and only to those who are authorized to access it. Vendors should be able to validate how they prevent and handle downtime and interruptions.

    Resiliency is also a large component of availability and stretches across many areas. This can include redundant or N+1 data center infrastructure with at least one independent backup component, or offline data backups and replication.
  4. Controls – Physical security, logical security, secure software development, incident management, asset management and compliance are key concepts that should be outlined in a vendor information security policy or in a standalone policy.

Subscribe to Venminder

Get expert insights straight to your inbox.

Ready to Get Started?

Schedule a personalized solution demonstration to see if Venminder is a fit for you.

Request a Demo