University of Minnesota  Appendix

Vendor/Supplier Management Standard

Sidebar

Expand all

Sidebar

Table of Contents

TOC placeholder

Governing Policy

Questions?

Please use the contact section in the governing policy.

Objective

To ensure appropriate information security controls in vendor IT services or products that collect, transmit, process, or store University data from the procurement through the termination process and to ensure appropriate stewardship of University assets and integrity when acquiring goods and services.

Security Controls

Procurement Table

The following table defines baseline security controls that an individual or unit need to include in their procurement process.

ControlSecurity Level
IDDescriptionHighMediumLow
VSM.A.01Include the Information Security Software/Hardware or Professional Services questions where applicable to the purchase of a product or service.RequiredRequiredRecommended
VSM.A.02Review that the product/service can be implemented in a manner that conforms to the University Administrative Policy: Information Security and standards.RequiredRequiredRequired
VSM.A.03Review the Information Security Questions for Contract Review and include applicable sections in the contract.RequiredRequiredRequired
VSM.A.04Obtain and review the vendor certifications/attestations of compliance to meet legal or contractual obligations and to ensure expected security controls are in place (e.g., SSAE18, ISO 27001, or for PCI DSS: SAQ/ROC, Cloud Security Alliance).RequiredRecommendedRecommended

Ongoing Table

The following table defines baseline security controls that an individual or unit need to include in their on-going process of managing a vendor contract or purchase agreement.

ControlSecurity Level
IDDescriptionHighMediumLow
VSM.B.01Monitor vendor product/service to ensure that it continues to conform to Administrative Policy: Information Security and standards. Consult the legal, regulatory, or contractual obligation for frequency. For others suggest at contract renewal or maximum of 3 years.RequiredRequiredRequired
VSM.B.02Document the periodic review of the vendor's certifications/ attestations of compliance to meet legal or contractual obligations and to ensure expected security controls are in place (e.g., SSAE18, ISO 27001, or for PCI DSS: SAQ/ROC, Cloud Security Alliance). Consult the legal, regulatory, or contractual obligation for frequency. For others, suggest at contract renewal or maximum of 3 years.RequiredRecommendedRecommended

Termination Table

The following table defines baseline security controls that an individual or unit need to include in their termination of a vendor contract or purchase agreement.

ControlSecurity Level
IDDescriptionHighMediumLow
VSM.C.01Work with the vendor to follow the University data retention procedure.RequiredRequiredRequired
VSM.C.02Confirm and document with the vendor the secure disposal of equipment/media and University data (see Media Sanitization standard)RequiredRequiredRequired

Resources Covered

This standard applies to IT resources owned or contracted by the University.

Individuals Covered

This standard applies to University community members who purchase or manage contracts for University IT resources.

Related Information

Published Date

March 2016 

Last Reviewed

April 2019