[go: up one dir, main page]

0% found this document useful (0 votes)
146 views2 pages

IC Vendor Risk Assessment Template

This vendor risk assessment template lists 40 potential risks a vendor may pose in areas like privacy, security, access controls, and compliance. The risks are rated on impact from low to high, with customer data security breaches rated as the highest risk and risk assessment process failures as the lowest. Adhering to privacy laws and maintaining effective information security teams are also identified as medium risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
146 views2 pages

IC Vendor Risk Assessment Template

This vendor risk assessment template lists 40 potential risks a vendor may pose in areas like privacy, security, access controls, and compliance. The risks are rated on impact from low to high, with customer data security breaches rated as the highest risk and risk assessment process failures as the lowest. Adhering to privacy laws and maintaining effective information security teams are also identified as medium risks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 2

VENDOR RISK ASSESSMENT TEMPLATE

RISK
# RISK ASSESSMENT DESCRIPTION NOTES
RATING

1 Risk Assessment process failure LOW

2 Failure to adhere to privacy laws MEDIUM

3 Customer data security breach HIGH

4 Breakdown of Information Security team N/A

5 Breach of non-disclosure agreements

6 External party access to non-public information

7 Asset management policy breach

8 Non-disclosure / confidentiality breach

9 Systems access breach

10 Building access breach

11 Visitor access issues

12 Identification badge / keyless entry issues

13 Non-public printed material security issues

14 System change procedure issues

15 Routine testing problems

16 Password protection system breakdown

17 Password sharing issues

18 Third-party access breach of non-public data

19 Instant messaging protection issues

20 Incident response plan failure

21 Lack of compliance and ethics training

22 Lack of compliance and ethics policy adherence

23 Inactive user access maintenance problems

24
25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

You might also like