ISO/IEC 27036-2:2014
(Main)Information technology - Security techniques - Information security for supplier relationships - Part 2: Requirements
Information technology - Security techniques - Information security for supplier relationships - Part 2: Requirements
ISO/IEC 27036-2:2014 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships. These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, software and hardware components, knowledge process procurement, Build-Operate-Transfer and cloud computing services. These requirements are intended to be applicable to all organizations, regardless of type, size and nature. To meet these requirements, an organization should have already internally implemented a number of foundational processes, or be actively planning to do so. These processes include, but are not limited to, the following: governance, business management, risk management, operational and human resources management, and information security.
Technologies de l'information — Techniques de sécurité — Sécurité d'information pour la relation avec le fournisseur — Partie 2: Exigences
General Information
Relations
Frequently Asked Questions
ISO/IEC 27036-2:2014 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - Security techniques - Information security for supplier relationships - Part 2: Requirements". This standard covers: ISO/IEC 27036-2:2014 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships. These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, software and hardware components, knowledge process procurement, Build-Operate-Transfer and cloud computing services. These requirements are intended to be applicable to all organizations, regardless of type, size and nature. To meet these requirements, an organization should have already internally implemented a number of foundational processes, or be actively planning to do so. These processes include, but are not limited to, the following: governance, business management, risk management, operational and human resources management, and information security.
ISO/IEC 27036-2:2014 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships. These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, software and hardware components, knowledge process procurement, Build-Operate-Transfer and cloud computing services. These requirements are intended to be applicable to all organizations, regardless of type, size and nature. To meet these requirements, an organization should have already internally implemented a number of foundational processes, or be actively planning to do so. These processes include, but are not limited to, the following: governance, business management, risk management, operational and human resources management, and information security.
ISO/IEC 27036-2:2014 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security; 35.040 - Information coding. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC 27036-2:2014 has the following relationships with other standards: It is inter standard links to ISO/IEC 27036-2:2022. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase ISO/IEC 27036-2:2014 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 27036-2
First edition
2014-08-01
Information technology — Security
techniques — Information security for
supplier relationships —
Part 2:
Requirements
Technologies de l’information — Techniques de sécurité — Sécurité
d’information pour la relation avec le fournisseur —
Partie 2: Exigences
Reference number
©
ISO/IEC 2014
© ISO/IEC 2014
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2014 – All rights reserved
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Symbols and abbreviated terms . 1
5 Structure of ISO/IEC 27036-2 . 2
6 Information security in supplier relationship management . 4
6.1 Agreement processes . 4
6.2 Organisational project-enabling processes . 7
6.3 Project processes .10
6.4 Technical processes .14
7 Information security in a supplier relationship instance .15
7.1 Supplier relationship planning process.15
7.2 Supplier selection process .17
7.3 Supplier relationship agreement process .21
7.4 Supplier relationship management process .24
7.5 Supplier relationship termination process .27
Annex A (informative) Cross-references between ISO/IEC 15288 clauses and ISO/
IEC 27036-2 clauses .30
Annex B (informative) Cross-references between ISO/IEC 27036-2 clauses and ISO/
IEC 27002 controls .32
Annex C (informative) Objectives from Clauses 6 and 7 .34
Bibliography .38
© ISO/IEC 2014 – All rights reserved iii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
Details of any patent rights identified during the development of the document will be in the Introduction
and/or on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity
assessment, as well as information about ISO’s adherence to the WTO principles in the Technical Barriers
to Trade (TBT) see the following URL: Foreword - Supplementary information
The committee responsible for this document is ISO/IEC JTC 1, Information technology, SC 27, IT Security
techniques.
ISO/IEC 27036 consists of the following parts, under the general title Information technology — Security
techniques — Information security for supplier relationships:
— Part 1: Overview and concepts
— Part 2: Requirements
— Part 3: Guidelines for information and communication technology supply chain security
The following part is under preparation:
— Part 4: Guidelines for security of cloud services.
iv © ISO/IEC 2014 – All rights reserved
Introduction
Organizations throughout the world work with suppliers to acquire products and services. Many
organizations establish several supplier relationships to cover a variety of business needs, such as
operations or manufacturing. Conversely, suppliers provide products and services to several acquirers.
Relationships between acquirers and suppliers established for the purpose of acquiring a variety of
products and services may introduce information security risks to both acquirers and suppliers. These
risks are caused by mutual access to the other party’s assets, such as information and information
systems, as well as by the difference in business objectives and information security approaches. These
risks should be managed by both acquirers and suppliers.
ISO/IEC 27036-2:
a) specifies fundamental information security requirements for defining, implementing, operating,
monitoring, reviewing, maintaining and improving supplier and acquirer relationships;
b) facilitates mutual understanding of the other party’s approach to information security and tolerance
for information security risks;
c) reflects the complexity of managing risks that can have information security impacts in supplier
and acquirer relationships;
d) is intended to be used by any organization willing to evaluate the information security in supplier
or acquirer relationships;
e) is not intended for certification purposes;
f) is intended to be used to set a number of defined information security objectives applicable to a
supplier and acquirer relationship that is a basis for assurance purposes.
ISO/IEC 27036-1 provides overview and concepts associated with information security in supplier
relationships.
ISO/IEC 27036-3 provides guidelines to the acquirer and the supplier for managing information security
risks specific to the ICT products and services supply chain.
ISO/IEC 27036-4 (to be published) provides guidelines to the acquirer and the supplier for managing
information security risks specific to the cloud services.
NOTE The user of this document needs to correctly interpret each of the forms of the expression of provisions
(e.g. “shall”, “shall not”, “should” and “should not”) as being either requirements to be satisfied or recommendations
where there is a certain freedom of choice.
© ISO/IEC 2014 – All rights reserved v
INTERNATIONAL STANDARD ISO/IEC 27036-2:2014(E)
Information technology — Security techniques —
Information security for supplier relationships —
Part 2:
Requirements
1 Scope
This part of ISO/IEC 27036 specifies fundamental information security requirements for defining,
implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer
relationships.
These requirements cover any procurement and supply of products and services, such as manufacturing
or assembly, business process procurement, software and hardware components, knowledge process
procurement, Build-Operate-Transfer and cloud computing services.
These requirements are intended to be applicable to all organizations, regardless of type, size and
nature.
To meet these requirements, an organization should have already internally implemented a number of
foundational processes, or be actively planning to do so. These processes include, but are not limited to,
the following: governance, business management, risk management, operational and human resources
management, and information security.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and are
indispensable for its application. For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 27000, Information technology — Security techniques — Information security management
systems — Overview and vocabulary
ISO/IEC 27036-1, Information technology — Security techniques — Information security for supplier
relationships — Part 1: Overview and concepts
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 27000 and ISO/IEC 27036-
1 apply.
4 Symbols and abbreviated terms
The following symbols (and abbreviated terms) are used in this standard:
ASP Application Service Provider
BCP Business Continuity Plan
DBA Database Administrator
© ISO/IEC 2014 – All rights reserved 1
ICT Information and Communication Technology
ISMS Information Security Management System
ITT Invitation to Tender
RFP Request for Proposal
VoIP Voice over IP
5 Structure of ISO/IEC 27036-2
Clause 6 defines fundamental and high-level information security requirements applicable to the
management of several supplier relationships. Any of the processes in Clause 6 can be applied to
individual supplier relationships at any point in that supplier relationship lifecycle.
[1]
These requirements are structured according to life cycle processes specified in ISO/IEC 15288. These
requirements shall be applied by the acquirer and by the supplier to ensure that these organisations are
able to manage information security risks resulting from supplier relationships.
NOTE Clause 6 only references the ISO/IEC 15288 life cycle processes that are relevant to information
security in supplier relationships.
Clause 7 defines fundamental information security requirements applicable to an acquirer and a supplier
within a context of a single supplier relationship instance.
These requirements are structured given following supplier relationship life cycle processes:
a) Supplier relationship planning process;
b) Supplier selection process;
c) Supplier relationship agreement process;
d) Supplier relationship management process;
e) Supplier relationship termination process.
Requirements in Clause 7 shall be applied by the acquirer and the supplier involved in a supplier
relationship to ensure that these organisations are able to manage relevant information security risks.
Figure 1 describes the scope of the fundamental information security requirements in connection with
processes defined in Clauses 6 and 7:
2 © ISO/IEC 2014 – All rights reserved
Scope
6.1 Agreement processes
6.1.1 Acquisition 6.1.2 Supply process
process
6.2 Organisational project-enabling processes
6.2.1 Life cycle model 6.2.2 Infrastructure 6.2.3 Project portfolio
management process
management process management process
6.2.4 Human 6.2.5 Quality
resource
management
management process
process
Fundamental and high-
level information security
requirements for
acquirers and suppliers
6.3 Project processes
as organizational
6.3.1 Project planning 6.3.2 Project 6.3.3 Decision
scheme commonly
process assessment and management process
applicable to instances
control process
of supplier relationship.
6.3.4 Risk 6.3.5 Configuration 6.3.6 Information
management process management process management process
6.3.7 Measurement
process
6.4 Technical processes
6.4.1 Architectural
design process
7.1 Supplier 7.2 Supplier selection 7.3 Supplier
Fundamental information
relationship planning process relationship
security requirements for
process agreement process
acquirers and suppliers
when establishing and
7.4 Supplier 7.5 Supplier
maintaining an instance
relationship relationship
of supplier relationship.
management process termination process
Figure 1 — Scope of fundamental information security requirements defined in Clauses 6 and 7
© ISO/IEC 2014 – All rights reserved 3
Text of Clauses 6.1 to 6.4, and of Clauses 7.1 to 7.5 is structured in tables which need to be interpreted
as follows:
Acquirer
Text specific to the acquirer.
Supplier
Text specific to the supplier.
Acquirer Supplier
Text specific to both acquirer and supplier, unless explicitly stated.
Text specific to the acquirer. Text specific to the supplier.
There are three informative annexes.
Annex A provides cross-references between clauses of ISO/IEC 15288 that are relevant to supplier
relationships and clauses of ISO/IEC 27036-2.
Annex B provides cross-references between clauses of ISO/IEC 27036-2 and information security
[2]
controls listed in ISO/IEC 27002 and that are relevant to supplier relationships.
Annex C provides lists of objectives that are stated in Clauses 6 and 7 for the acquirer and supplier.
6 Information security in supplier relationship management
6.1 Agreement processes
Organisations can enter into a variety of supplier relationships. Suitable relationships between acquirers
and suppliers are achieved using agreements defining information security roles and responsibilities
with respect to the supplier relationship.
The following agreement processes support procurement or supply of a product or service from both
strategic and information security perspectives:
a) Acquisition process;
b) Supply process.
6.1.1 Acquisition process
6.1.1.1 Objective
The following objective shall be met by the acquirer for successfully managing information security
within the acquisition process:
Acquirer
a) Establish a supplier relationship strategy that:
1) Is based on the information security risk tolerance of the acquirer;
2) Defines the information security foundation to use when planning, preparing, managing and
terminating the procurement of a product or service.
4 © ISO/IEC 2014 – All rights reserved
6.1.1.2 Activities
The following minimum activities shall be executed by the acquirer to meet the objective defined at
Clause 6.1.1.1:
Acquirer
a) Define, implement, maintain and improve a supplier relationship strategy containing the follow-
ing:
1) Management motives, needs and expectations from procuring products or services;
NOTE These statements should be expressed from business, operational, legal and regula-
tory perspectives.
2) Management commitment to allocate necessary resources;
3) An information security risk management framework to use for assessing information secu-
rity risks accompanying the procurement of a product or service;
NOTE Clause 6.3.4 defines information security requirements for the establishment of an
information security risk management framework.
4) A framework to use when defining information security requirements during the supplier
relationship planning process;
This framework shall be defined following information security guidelines and rules, such as
information security policy and information classification, established by the acquirer.
Information security requirements defined in this framework need to be customized to each
supplier relationship instance, considering type and nature of the product or service that is
procured.
This framework shall also include the following:
i) Methods for suppliers to provide evidence for adherence to the defined information
security requirements;
ii) Methods for the acquirer to validate suppliers’ adherence to the defined information
security requirements;
iii) Processes for sharing information about information security changes, incidents and
other relevant events among the acquirer and suppliers.
5) A supplier selection criteria framework to use when selecting a supplier and which includes
the following:
i) Methods for assessing the information security maturity required from a supplier;
The following elements can be requested from the supplier to evaluate its information
security maturity:
1. Past security-relevant performance;
2. Evidence of pro-active management of information security (e.g. holding an ISO/
IEC 27001 certification relevant to the supply of the product or service);
3. Evidence of documented and tested business continuity and ICT continuity plans.
ii) Methods to be used for assessing evidence provided by a supplier based on the defined
information security requirements;
iii) Methods for assessing supplier acceptance of the following:
1. Information security requirements defined in the supplier relationship plan;
2. Commitment to support the acquirer in its compliance monitoring and enforcement
activities;
3. Transition of the product or service supply that may be procured when it has been
previously manufactured or operated by the acquirer or by a different supplier;
© ISO/IEC 2014 – All rights reserved 5
4. Termination of the product or service supply.
iv) Supplier-specific requirements, to be defined in accordance to business, legal, regula-
tory, architectural, policy and contractual expectations from the acquirer, such as:
1. Financial strength of the supplier for being able to supply the product or service;
2. Location of the supplier and from which the product or service will be supplied to
particularly reduce the risk of legal and regulatory breaches.
6) High-level information security requirements to use when defining the following:
i) Transition plan to transfer a product or service procured to a different supplier;
ii) Information security change management procedure;
iii) Information security incident management procedure;
iv) Compliance monitoring and enforcement plan;
v) Termination plan to terminate the procurement of a product or service.
b) Appoint an individual responsible for handling the information security aspects of the supplier
relationship strategy and ensure that this individual is appropriately and regularly trained.
c) Ensure the supplier relationship strategy is reviewed at least once a year and whenever signifi-
cant business, legal, regulatory, architectural, policy and contractual changes occur.
NOTE The supplier relationship strategy should also be reviewed when a product or service is
procured that can significantly impact the acquirer.
6.1.2 Supply process
6.1.2.1 Objective
The following objective shall be met by the supplier for successfully managing information security
within the supply process:
Supplier
a) Establish an acquirer relationship strategy that
1) Is based on the information security risk tolerance of the supplier;
2) Defines the information security foundation to use when planning, preparing, managing and
terminating the supply of a product or service.
6.1.2.2 Activities
The following minimum activities shall be executed by the supplier to meet the objective defined at
Clause 6.1.2.1:
Supplier
a) Define, implement, maintain and improve an acquirer relationship strategy containing the follow-
ing:
1) Management motives, needs and expectations from supplying of products or services;
NOTE These statements should be expressed from business, operational, and legal perspec-
tives.
2) Management commitment to allocate necessary resources;
3) An information security risk management framework to use for assessing information secu-
rity risks that accompany the supply of a product or a service;
NOTE Clause 6.3.4 defines information security requirements for the establishment of an
information security risk management framework.
6 © ISO/IEC 2014 – All rights reserved
4) An information security management framework by:
i) Defining, implementing, maintaining and improving an information security manage-
ment within the organization;
NOTE An ISMS establishment based on ISO/IEC 27001 can serve to ensure adequate
information security management within the organization and to demonstrate its level
to acquirers.
ii) Ensuring that information security requirements stated in existing acquirer tender
documents and supplier relationship agreements have been identified for ensuring the
supplier information security conformity to these requirements;
Any gap shall be addressed to satisfy acquirer’s information security requirements of
existing supplier relationship agreements.
iii) Defining a process to accept, interpret, apply and measure acquirer information secu-
rity requirements.
5) Methods for:
i) Demonstrating supplier’s capacity to supply a product or service of acceptable quality;
ii) Providing evidence of adherence to information security requirements defined by
acquirers.
6) High-level information security requirements to use when defining the following:
i) Transition plan to support the transfer of a product or service supply when it has been
previously manufactured or operated by an acquirer or by another supplier;
ii) Information security change management procedure;
iii) Information security incident management procedure;
iv) Processes for sharing information about information security changes, incidents and
other relevant events among the supplier and acquirers;
v) Process for handling corrective actions;
vi) Termination plan to terminate the supply of a product or service.
b) Appoint an individual responsible for handling the information security aspects of the acquirer
relationship strategy and ensure that this individual is appropriately and regularly trained.
c) Ensure the acquirer relationship strategy is reviewed at least once a year and whenever signifi-
cant business, legal, regulatory, architectural, policy and contractual changes occur.
NOTE The acquirer relationship strategy should also be reviewed when a supplier relationship
is established that can significantly impact the supplier.
6.2 Organisational project-enabling processes
The organisational project-enabling processes are concerned with ensuring that the resources, such as
the financial ones, needed to enable the project to meet the needs and expectations of the organization’s
interested parties are met.
In particular, following organisational project-enabling processes support the establishment of the
environment in which supplier relationships are conducted or planned:
a) Life cycle model management process;
b) Infrastructure management process;
c) Project portfolio management process;
d) Human resource management process;
e) Quality management process.
© ISO/IEC 2014 – All rights reserved 7
6.2.1 Life cycle model management process
Acquirer Supplier
a) The acquirer and the supplier shall establish the life cycle model management process when man-
aging information security in supplier relationships.
NOTE The purpose of this process is to define, maintain, and ensure availability of policies,
life cycle processes, life cycle models, and procedures for use by the organization. There are no
specific information security requirements and recommendations for acquirers or suppliers to
consider when internally establishing this process.
6.2.2 Infrastructure management process
6.2.2.1 Objective
The following objective shall be met by each of the following organisations for successfully managing
information security within the infrastructure management process:
Acquirer Supplier
a) Provide the enabling infrastructure to support the organization in managing information secu-
rity within supplier relationships.
6.2.2.2 Activities
The following minimum activities shall be executed by each of the following organisations to meet the
objective defined at Clause 6.2.2.1:
Acquirer Supplier
a) Define, implement, maintain and improve physical and logical security infrastructure capabilities
for protecting acquirer’s or supplier’s assets, such as information and information systems; and
b) Define, implement, maintain and improve contingency arrangements to ensure that the procure-
ment or the supply of a product or service can continue in the event of its disruption caused by
natural or man-made causes.
These arrangements should be based on information security risk assessments and associ-
ated treatment plans resulting from the procurement or the supply of a product or service, and
include:
1) The provision of alternative, secure facilities for the product or service supply to continue;
2) Escrow of information and proprietary technologies, such as application source code and
cryptographic keys, using a trusted third party;
3) Recovery arrangements to ensure continued availability of information stored at subcontrac-
tor premises; and
NOTE These arrangements should only be considered when the supplier supplies services
to an acquirer.
4) Alignment with business continuity constraints expressed by an acquirer or supplier.
NOTE The following International Standards provide requirements and guidelines on con-
tingency arrangements:
[3]
1. ISO/IEC 27031
[4]
2. ISO 22313
[5]
3. ISO 22301
8 © ISO/IEC 2014 – All rights reserved
6.2.3 Project portfolio management process
6.2.3.1 Objective
The following objective shall be met by each of the following organisations for successfully managing
information security within the project portfolio management process:
Acquirer Supplier
a) Establish a process for considering information security and overall business mission implica-
tions and dependencies for each individual project for those projects where suppliers or acquir-
ers are involved.
6.2.3.2 Activities
The following minimum activities shall be executed by each of the following organisations to meet the
objective defined within Clause 6.2.3.1:
Acquirer Supplier
a) Define, implement, maintain and improve a process for identifying and categorizing suppliers or
acquirers based on the sensitivity of the information shared with them and on the access level
granted to them to acquirer’s or supplier’s assets, such as information and information systems;
NOTE A supplier having very limited access to the acquirer’s assets, such as information and
information systems, may be categorised as not critical, while a supplier developing critical busi-
ness software for the acquirer may be categorised as critical.
b) Define, implement, maintain and improve a
process for ensuring that information secu-
rity considerations are integrated into the
evaluation of supplier performance as a part
of each individual project; and
c) Ensure that project closeout involving a supplier or acquirer integrates information security
activities documented in a termination plan.
6.2.4 Human resource management process
6.2.4.1 Objective
The following objective shall be met by each of the following organisations for successfully managing
information security within the human resource management process:
Acquirer Supplier
a) Ensure the acquirer and the supplier are provided with necessary human resources having
competences regularly maintained and consistent with information security needs in supplier
relationships.
6.2.4.2 Activities
The following minimum activities shall be executed by each of the following organisations to meet the
objective defined at Clause 6.2.4.1:
Acquirer Supplier
a) Consider the following in the information security training and awareness programme as part of
the human resource management process:
© ISO/IEC 2014 – All rights reserved 9
1) Information security guidelines and rules, such as the information security policy and infor-
mation classification, in particular for personnel dealing with supplier relationships;
2) Information security requirements
generally defined in a supplier relation-
ship agreement, for demonstrating the
existence of such requirements that meet
acquirer’s needs and expectations;
3) Suppliers’ past performance in regards to
their level of conformity with acquirer’s
information security requirements, for
demonstrating potential lack of compli-
ance.
b) Identify and assess personnel with regard to their access to and ability to disclose or modify
information within a supplier relationship, such as sensitive information or intellectual property
that should not be disclosed or modified;
c) Ensure that identified personnel, especially those engaged in the information security or in the
decision of the procurement or supply of a product or service, have adequate competencies and
qualifications.
d) Train these personnel on information security aspects of supplier relationships to particularly
ensure that the handling of sensitive information is correctly understood;
e) Ensure that detailed criminal and background checks have been performed for personnel assum-
ing key positions in supplier relationships, where permissible by law; and
f) Designate contact points and their backups for critical aspects of each supplier relationship
including operations and maintenance to ensure minimum impact when personnel leave the
organization.
6.2.5 Quality management process
Acquirer Supplier
a) The acquirer and the supplier shall establish a quality management process when managing
information security in supplier relationships.
NOTE The purpose of this process is to ensure that products and services meet organization
quality objectives and achieve customer satisfaction. There are no specific information security
requirements and recommendations for acquirers and suppliers to consider when internally
establishing this process.
6.3 Project processes
Project processes are concerned with rigorous project management and project support, covering one
or more suppliers.
In particular, following project processes support the establishment of the environment in which
supplier relationship instances are conducted or planned:
a) Project planning process;
b) Project assessment and control process;
c) Decision management process;
d) Risk management process;
e) Configuration management process;
f) Information management process;
10 © ISO/IEC 2014 – All rights reserved
g) Measurement process.
6.3.1 Project planning process
6.3.1.1 Objective
The following objective shall be met by each of the following organisations for successfully managing
information security within the project planning process:
Acquirer Supplier
a) Establish a project planning process addressing information security of supplier relationships.
6.3.1.2 Activities
The following minimum activities shall be executed by each of the following organisations to meet the
objective defined at Clause 6.3.1.1:
Acquirer Supplier
a) Include the following as part of the project planning process:
1) Impacts on project costs, plans and schedule of information security requirements defined
for assets used within the procurement or supply of a product or service;
2) Integration of information security into relevant project roles, responsibilities, accountabili-
ties, and authorities;
3) Securing sensitive internal information that can be impacted by supplier relationships, such
as financial, intellectual property, customer or staff information; and
4) Resources, such as financial ones, that are required to ensure protection of assets.
6.3.2 Project assessment and control process
Acquirer Supplier
a) The acquirer and the supplier shall establish a project assessment and control process when man-
aging information security in supplier relationships.
NOTE: The purpose of this process is to determine the status of the project and direct project
plan execution to ensure that the project performs according to plans and schedules, within pro-
jected budgets, to satisfy technical objectives. There are no specific information security require-
ments and recommendations for acquirers or suppliers to consider when internally establishing
this process (adapted from ISO/IEC 15288).
6.3.3 Decision management process
Acquirer Supplier
a) The acquirer and the supplier shall establish a decision management process when managing
information security in supplier relationships.
NOTE: The purpose of this process is to select the most beneficial course of project action where
alternatives exist. There are no specific information security requirements and recommenda-
tions for acquirers or suppliers to consider when internally establishing this process (adapted
from ISO/IEC 15288).
© ISO/IEC 2014 – All rights reserved 11
6.3.4 Risk management process
6.3.4.1 Objective
The following objective shall be met by each of the following organisations for successfully managing
information security within the risk management process:
Acquirer Supplier
a) Continuously address information security risks in supplier relationships and throughout their
life cycle including re-examining them periodically or when significant business, legal, regula-
tory, architectural, policy and contractual changes occur.
6.3.4.2 Activities
The following minimum activities shall be executed by each of the following organisations to meet the
objective defined at Clause 6.3.4.1:
Acquirer Supplier
a) Define, implement, maintain and improve an information security risk management framework
that defines the organization’s risk tolerance and that can be used for identifying, assessing, and
treating information security risks that accompany:
1) Existing instances of procurement or supply of product or service;
2) Suppliers or acquirers involved in these instances;
3) The procurement or supply of a product or service.
[6] [7]
NOTE: ISO/IEC 27005, ISO 31000 and ISO/IEC 15288 provide guidance on risk manage-
ment.
Care should be taken to ensure that this framework is defined:
1) Following the organization’s business or mission and considering legal, regulatory, architec-
tural, policy and contractual requirements applicable to the organization.
2) Considering the assessment of suppliers 2) Considering the assessment of acquirers
in terms of: in terms of:
i) Past history, such as previous and i) Past history, such as previous and
current business arrangements and current business arrangements and
dispute information; dispute information;
ii) Contractual agreements, such as ii) Contractual agreements, such as
supplier relationship agreements supplier relationship agreements
and non-disclosure agreements; and non-disclosure agreements;
iii) Information security implications of iii) Information security implications
the product or service procurement, of the product or service supply,
including acquirer’s assets handled, including:
underlying technology infrastruc-
1. information security require-
ture, business dependency and sub-
ments given in the tender docu-
contractors used;
ment or supplier relationship
agreement;
12 © ISO/IEC 2014 – All rights reserved
iv) Supplier capability to demonstrate 2. information security risks of the
its maturity in information security. supplier which emerge from the
acquirer’s access to supplier’s
3) Considering the following when defining
information in the case, e.g. the
the method for assessing suppliers:
acquirer applies a level of con-
i) The type of assessment to apply to
trol on the provider’s production
suppliers, such as a self-assessment
process with access to the sup-
or an independent assessment per-
plier’s sensitive information.
formed by a third party;
ii) The level of details of the assess-
ment and its frequency of execution.
b) Apply this information security risk management framework:
1) To classify existing instances of procurement or supply of product or service;
2) To classify suppliers or acquirers involved in these instances;
3) When:
i) Defining the supplier or acquirer relationship strategy;
ii) Planning to procure or supply a product or service.
[8]
NOTE: In case the organization holds an ISO/IEC 27001 certification, it is recommended to include
the assets resulting from the procurement or supply of a product or service in the ISMS asset inven-
tory to ensure continuously information security risk assessment and treatment.
6.3.5 Configuration management process
Acquirer Supplier
a) If applicable, the acquirer and the supplier shall establish a configuration management process
when managing information security in supplier relationships.
NOTE 1: The purpose of this process is to establish and maintain the integrity of all identified
outputs of a project or process and make them available to concerned parties. There are no
specific information security requirements and recommendations to consider by each of these
organisations when internally establishing this process (adapted from ISO/IEC 15288).
NOTE 2: When implementing the configuration management process, it is recommended to con-
sider ISO/IEC 27002 providing guidance in change management and change control procedures.
6.3.6 Information management process
Acquirer Supplier
a) The acquirer and the supplier shall establish an information management process considering
the sensitivity of information that can be exchanged during supplier relationships.
NOTE 1: The purpose of this process is to provide relevant, timely, complete, valid and, if
required, confidential information to designated parties. There are no specific information
security requirements and recommendations to consider by each of these organisations when
internally establishing this process (adapted from ISO/IEC 15288).
NOTE 2: Establish an ISMS based on ISO/IEC 27001 can serve as a basis for applying adequate
information security of information exchanges, in particular in case of information security
changes and incidents happening during supplier relationships.
© ISO/IEC 2014 – All rights reserved 13
6.3.7 Measurement process
6.3.7.1 Objective
The following objective shall be met by each of the following organisations for successfully managing
information security within the measurement process:
Acquirer Supplier
a) Collect, analyse, and report information security measures related to the procurement or supply
of a product or service to demonstrate the maturity of information security in supplier relation-
ships and to support effective management of processes.
6.3.7.2 Activities
The following minimum activities shall be executed by each of the following organisations to meet the
objective defined at Clause 6.3.7.1:
Acquirer Supplier
a) Define, implement, maintain and improve an information security measurement framework that
can be used for assessing the procurement or supply of product or service.
[9]
NOTE: ISO/IEC 27004 provides guidance on information security measurement that can be
applied to develop and implement specific measures related to information security in supplier
relationships.
Care should be taken to ensure that this framework is defined following the organization’s busi-
ness or mission and considering legal, regulatory, architectural, policy and contractual require-
ments applicable to the organization.
b) Apply this information security measurement framework when preparing a supplier relationship
instance to agree with the other party about what is to be measured, how the measures are to
be reported, the frequency of reporting and the actions to be undertaken if the measures do not
meet specified criteria.
6.4 Technical processes
Technical processes are generally used by a supplier for following purposes:
a) Define requirements for a product or service;
b) Transform these requirements into an effective product or service;
c) Sustain the provision of the procured or supplied product or service;
d) Permit consistent and quality reproduction of the procured or supplied product or service when
necessary; and
e) Dispose of the product or service when it has been decided to retire it.
NOTE ISO/IEC 27036-3 provides guidance on other technical processes in addition to the one defined here.
14 © ISO/IEC 2014 – All rights reserved
6.4.1 Architectural design process
6.4.1.1 Objective
The following objective shall be met by each of the following organisations for successfully managing
information security within the architectural design process:
Acquirer Supplier
a) Establish a technical framework for sustai
...










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...