Vendor Security Policy
Purpose
The purpose of this policy is to inform all DefectDojo employees and external parties with access to DefectDojo equipment, systems, or networks (DefectDojo Staff) of their obligations with regards to the security and privacy due diligence as part of the procurement of services for Third-Party Suppliers (Vendors).
Scope
Risk management of Vendors as applied to information security and the confidentiality, integrity, and availability of company-owned, processed, stored, and transmitted information.
Compliance
Compliance Measurement
The Information Security Management team will verify compliance to this document through various methods, including but not limited to business tool reports, internal and external audits, and feedback to the document owner.
Exceptions
Any exception to this document must be reviewed and approved in advance by the Management Review Team.
Non-Compliance
Any DefectDojo Staff found to have violated this document may be subject to disciplinary action, up to and including termination of employment.
Continual Improvement
This document is updated and reviewed as part of the continual improvement process.
Requirements
DefectDojo Staff
All DefectDojo Staff who procure Vendor services must notify the Security Operations Team and receive approval from Security Operations before signing new contracts and renewing existing contracts for all Vendors.
Security Operations Team
The Security Operations Team must ensure that the Vendor Security Principles outlined below are followed for all applicable Vendors.
Vendor Security Principles
Vendors must meet the company’s requirements, legislation, and regulation for data protection and security.
Vendor Register
All Vendors with direct access to DefectDojo sensitive data and IT systems are registered and recorded in the Vendor Register. Vendors are classified based on the processed, stored, or transmitted data. Vendors are assessed for criticality to the business. The following information is captured as a minimum:
- Vendor Name and contact details
- What they do for DefectDojo
- What data they process, store, or transmit
- Whether a contract exists and a copy of the contract
- What assurance exists over their data security
Vendor Security Procedure
Each Vendor is subject to audit and review of data security in line with the Vendor Security Procedure. The level of audit and review is based on risk.
Vendor Selection
Vendors are selected based on their ability to meet the needs of the business. Before engaging a Vendor, data security due diligence is carried out, including:
- An acceptable level of data security, considering services performed, access type, and severity, with identified, recorded, and managed risks
- Appropriate certifications
- Vendor agreements and contracts that include data security requirements
- Legal and regulatory compliance
Vendor Contracts, Agreements, and Data Processing Agreements
An appropriate contract, agreement, and/or Data Processing Agreement must be in place and enforceable before engaging a Vendor to process, store, or transmit confidential or personal information.
- Vendor contracts include the right to audit where feasible; independent security reports, certifications, or other evidence may substitute audits
- All company policies apply to Vendors where feasible
- Vendor sub-contractors are subject to the same terms and company policies as the Vendor
- Vendors are assessed for relevant privacy regulations, and privacy impact assessments or data processing agreements are in place when appropriate
Vendor Security Incident Management
Vendors must have a Security Incident Management process in place.
- Incidents impacting confidential or personal information must be reported within 72 hours
- Vendor security incidents affecting DefectDojo will be managed according to DefectDojo’s standard Incident Management Procedure
Vendor End of Contract
At the end of a contract, Vendors must confirm in writing that they have met contractual and legal obligations for the return or destruction of DefectDojo’s confidential and personal information.
- All access to systems and information is revoked
- All assets are returned to DefectDojo