Belgian Cyber Security Guide

Page 40

5. How does your company deal with information security risks from suppliers who can access your sensitive information?

✘ 

We have a relationship based on mutual trust with our suppliers. For some contracts we include information security related clauses.

have processes in place to validate access for suppliers and ✔ We specific security guidelines are communicated and signed by our suppliers.

The following 5 questions are intended to provide you some basic information security checks for your company.

Yes Are contractors and suppliers identified by an ID badge with a recent picture? Do you have policies addressing background checks for contractors and suppliers? Is access to facilities and information systems automatically cut off when a contractor or supplier ends his mission? Do suppliers know how and to whom to immediately report in your company any loss or theft of information? Does your company ensure suppliers keep their software and applications updated with security patches?

Link to relevant principle

40

| BELGIAN CYBER SECURITY GUIDE

Potential actions to improve your response

No


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.