Part of Objective A – Managing risk
Principle A4: Supply chain
A4.a Supply chain
Description
The organisation understands and manages security and information governance (IG) risks to information, systems and networks supporting the operation of essential functions that arise as a result of dependencies on external suppliers. This includes ensuring that appropriate measures are employed where third party services are used.
Expectation
The expectation for this contributing outcome is Partially achieved.
Indicators of good practice (IGP) achievement levels
Expand the achievement levels to find out the requirements needed to meet each level.
As documented in the introduction to this framework, independent assessors are expected to use their professional judgement when assessing organisations against the Cyber Assessment Framework (CAF).
The approach and documentation list described below provides guidance on how to conduct testing and should be adapted as appropriate in order to assess whether the NHS providers outcomes are effectively achieved.
Suggested approach to testing – Partially achieved
1. Supplier risks - ascertain how the organisation identifies and documents risks posed by suppliers to its essential functions. (PA#1)
2. Knowledge of supply chain - verify that the organisation has understood and documented all suppliers who support its essential functions. Where possible, this should include sub-contractors involved in the services supporting the essential functions. Where identifying sub-contractors is not possible, the organisation should document the efforts they have made to acquire this information. (PA#2)
3. Supplier contracts - obtain a sample of the organisation’s supplier contracts. Verify that:
- Appropriate cyber security and data protection obligations have been included. (PA#3)
- The data being shared by the organisation is clearly documented and understood by both parties. (PA#3, PA#6, A#3)
4. Third-party connections - obtain evidence that the organisation has documented all third-party connections to its networks. Verify what assurance the organisation has in place that each third-party connection and the vendor it belongs to meets the organisation’s cyber security and information governance requirements. Where gaining assurances is not possible, the organisation should document the efforts they have made to acquire this information. (PA#4)
5. International data transfers - verify that the organisation understands and documents all countries where data is being processed as part of its supplier-offered services. Obtain evidence that there are either adequacy decisions in place for these countries, or where there is no adequacy decision the organisation has appropriate legal mechanisms in place to facilitate the data transfer. (PA#7, A#9)
6. Supplier assurance - verify what assurances the organisation obtains from suppliers to ensure that they meet the organisation’s security and IG requirements. The assurances should be sufficient to confirm that information shared with the supplier is appropriately protect from well-known attacks and known vulnerabilities. (PA#6)
7. Incident management – discuss the incident management process and assess whether third-party incidents are considered. Verify that the organisation has agreed specific measures in their process to aid their response to incidents involving third parties. (PA#5)
Additional approach to testing – Achieved
1. Detailed supplier risks - obtain evidence that the organisation has identified and documented risks posed by suppliers to a deep level of detail. Verify that the organisation interrogates these risks as part of its risk assessment and procurement processes before onboarding suppliers. The risk considerations should include specific IG and cyber risks which emerge as a result of the supplier’s sub-contractors, the supplier’s partnerships and the supplier’s geographic location. (A#1)
2. Supply chain risk management - obtain evidence that the risks documented in step 1 have been discussed and reviewed by responsible decision-makers within the organisation. Where subversion of suppliers’ services would cause unacceptable consequences, mitigations should have been discussed, with short-term and long-term plans for remediation. (A#2)
3. Assurance against sophisticated attacks - verify what assurances the organisation obtains from suppliers to ensure that they meet the organisation’s security and IG requirements. The assurances should be sufficient to confirm that information shared with the supplier is appropriately protected from sophisticated attacks. (A#3)
4. Contract management plan – verify whether the organisation has a contract management plan in place which allows for regular review of important contracts. (A#4)
5. Roles and responsibilities - obtain the list of supplier contracts and obtain a sample. Verify that the customer/supplier ownership of responsibilities are laid out in those contracts. (A#5)
6. Network connections and data sharing - obtain evidence that the organisation understands and documents third-party connections to its network and data sharing with third-parties. Assess the supplier management processes the organisation has in place for ensuring that these connections and data being shared are necessary and proportionate for the services being provided, and obtain evidence that these processes are followed. (A#6)
7. Incident management process - obtain and inspect the organisation’s incident management process, and assess whether suppliers’ roles and responsibilities are documented. Request evidence of assurance the organisation has received from their most critical suppliers of mutual support during incidents. (A#7)
8. Changes in services - verify that the organisation has a scheduled or efficiently reactive process for liaising with other teams to keep track of changes to services that impact cyber security and information governance-related understandings and agreements with suppliers. Obtain evidence that this process is followed and changes are made where necessary without undue delay. (A#8)
9. Certification and right to audit - verify that as part of the organisation’s procurement processes, there is a requirement for supplier certifications to be obtained prior to the contract being signed. For the suppliers who the organisation has identified as most critical to the operation of its essential functions, contracts should also include a right to audit, based on specific parameters relevant to the services being provided. (A#10)
Suggested documentation – Partially achieved
Suggested documentation includes:
- documentation showing supplier risks to essential functions
- lists of suppliers and sub-contractors
- supplier contracts
- documentation showing third-party connections
- evidence of international data transfers being considered as part of supplier management processes
- supplier assurances regarding their cyber security and information governance practices
- incident management process documentation
Additional documentation – Achieved
Additional documentation includes:
- documentation showing detailed supplier risks to essential functions
- procedures for supplier risk management
- contract management plan
- procedures for managing third-party connections and data sharing
- supplier assurances of incident support
- procedures for cross-organisational tracking of changes in services
- evidence of right to audit for critical suppliers
Last edited: 2 January 2025 12:01 pm