We're preparing for vendor security reviews before bringing them on board, but I've noticed a frustrating trend: after contracts are signed, vendors often change subprocessors, hosting arrangements, or even their security measures. More often than not, we only find out about these changes through an email. With customers relying on us to manage these risks effectively, it seems like we're left to depend on vendors to inform us about these changes. What are the best practices for keeping vendor risk assessments current throughout the contract lifecycle?
3 Answers
Don't stress too much; this situation is pretty common. Initial vendor reviews are thorough, but ongoing monitoring often isn't as structured. Many teams start by defining what constitutes a 'material change' in their agreements, ensuring that vendors notify them about significant updates in contracts. Regular refresh reviews for high-risk vendors help manage the situation and keep it organized.
Indeed, onboarding can feel like the easy part, but mid-contract management is where the issues arise if you don't have a solid framework. It's crucial to define what a material change is, incorporate notice requirements into contracts, and engage in periodic refresh reviews depending on vendor criticality. Also, keeping all evidence in a central place is a must; otherwise, you're stuck digging through emails every time someone needs to know the last review date.
It's really helpful to centralize how you track vendor changes and evidence. In our team, we began using Delve to keep things together instead of having info scattered all over emails. This way, we avoid guesswork. Once we tackled these organization issues, it added a layer of clarity.

Related Questions
Can't Load PhpMyadmin On After Server Update
Redirect www to non-www in Apache Conf
How To Check If Your SSL Cert Is SHA 1
Windows TrackPad Gestures