Napsauttamalla ”Hyväksy” hyväksyt evästeiden tallentamisen laitteellesi sivuston navigoinnin parantamiseksi, sivuston käytön analysoimiseksi ja markkinointitoimissamme auttamiseksi. Katso meidän
Tietosuojakäytäntö
lisätietoja varten.
Kieltää
Hyväksy
Tietosuoja-asetukset
Välttämättömät evästeet
Vaaditaan
Markkinointievästeet
Olennaista
Mukauttamisevästeet
Olennaista
Analytics-evästeet
Olennaista
Hylkää kaikki evästeet
Salli kaikki evästeet
Tallenna asetukset
Ratkaisu
Ratkaisut
Prosessin kehittäminen
Keskitä toimittajien suojausprofiilit
Toimittajan due diligence
Pääsy laajaan olemassa olevaan toimittajakantaan
Tarkastelu ja korjaaminen
Automatisoi pisteytys käytäntöjen perusteella
Riskien havainnollistaminen
N-osapuoli- ja keskittymisriskit
Raportointi ja seuranta
Vastaa uusiin uhkiin
Käyttökohde-esimerkit
Tavarantoimittajan turvallisuuden ymmärtäminen
Säädösten noudattamisen varmistaminen
Tavarantoimittajia koskevien vaatimusten sertifiointi
Raportoinnin sujuvoittaminen
Kolmansien osapuolten rikkomusten hallinta
Yhteisöt
Julkinen sektori
Kriittinen kansallinen infrastruktuuri
Rahoitus- ja vakuutuspalvelut
Insurance
Teknologia
Esitelty tapaustutkimus
Katso kaikki tapaustutkimukset
Resurssit
Resurssit
Resurssikeskus
Kaikkien resurssien keskus
Akatemia
Opi toimitusketjun riskienhallinta
Tutkimus & Analyysi
Blogiviestit, raportit, valkoiset paperit, analyysi
Tapaustutkimukset
Asiakaskokemukset Risk Ledgeristä
Uutiset
Yritys- ja tuotepäivitykset
Tapahtumat
Webinaarit ja tulevat tapahtumat
Tyypit
Selittäjät ja oppaat
Uudet uhat
Tekniikka
Syväsukellukset
Data Insights -raportit
Analyysi
Suositeltu raportti
Katso kaikki raportit
Tuki
Apua
Ohjekeskus
Kaikki tuki yhdessä paikassa
FAQ
Usein kysytyt kysymykset
Tuotepäivitykset
Uutta ja muutosloki
Changelog
What's new
Asiakastuki
Käytä teknistä tukea
Alusta
Tavarantoimittajat
Arviointikehys
Kirjaudu sisään
Kehittyvä uhka
ToolShell On-Prem SharePoint Vulnerabilities: Emerging Threat Published on Risk Ledger
Katso kaikki uhat
Yritys
Noin
Tietoa meistä
Risk Ledger -tarina
Työpaikat
Elämä riskissä -kirjanpito
Mediaresurssit
Lehdistökeskus
Ota yhteyttä
Keskustele oikeille ihmisille
Tietoa
Tietosuojakäytäntö
Käyttöehdot
Suojausprofiili
Suositellut uutiset
Katso kaikki uutiset
English
Finnish
Swedish
Norwegian
Danish
Kirjaudu sisään
Varaa aika esittelyyn
Supplier Assessment Framework
SAF Search
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Domain
A
Security Governance
This domain covers how your security governance is designed, implemented, and maintained.
Security Risks
Domain
B
Security Certifications
This domain covers how your organisation maintains compliance with key security certifications.
Security Risks
Domain
C
HR Security
This domain covers the security controls you have implemented to mitigate security risk from your employees.
Security Risks
Domain
D
IT Operations
This domain covers the security controls you have implemented to maintain the health of your IT systems and processes.
Security Risks
Domain
E
Software Development
This domain covers the security controls you have implemented during the development of your IT applications.
Security Risks
Domain
F
Network and Cloud Security
This domain covers the security controls you have implemented to maintain the security and integrity of your corporate network and any cloud infrastructure.
Security Risks
Domain
G
Physical Security
This domain covers the physical security controls you have implemented to protect your organisation's physical premises.
Security Risks
Domain
H
Business Resilience
This domain covers the processes and plans you have in place to ensure a quick recovery if a failure occurs.
Security Risks
Domain
I
Supply Chain Management
This domain covers the processes and controls you have in place to ensure the security risk from your supply chain is mitigated.
Security Risks
Domain
J
Data Protection
This domain covers compliance with data protection legislation.
Security Risks
Domain
K
Artificial Intelligence
This domain covers use of Artificial Intelligence (AI) in your organisation and what you have done to prevent, identify, and respond to evidence of risk.
Security Risks
Domain
XA
Financial Risk
This domain covers financial risk in your organisation and what you have done to prevent, identify, and respond to evidence of financial risk.
Financial Risk
Domain
XB
Environmental, Social and Governance
This domain covers how your organisation manages and governs its environmental and social impact.
Environmental, Social and Governance
Domain A Question
20
20) Does your organisation have an internal audit function that ensures information security requirements are being met by the business?
Answer yes if you have an internal team who audit your security function against your policies to ensure compliance. Please comment on the frequency of the audits in the notes.
Domain B Question
5
05) Are you PCI DSS compliant?
Answer yes if your organisation is compliant with the PCI DSS security standard. If you have answered no, please state whether or not you process, store or transmit payment card data. If you have certified against the standard, please provide your certificate.
Domain C Question
1
01) Does your organisation perform background checks on staff and contractors?
Answer yes if background checks are conducted against staff before they join your organisation. In the notes section, please outline the types of checks (e.g. employer reference, criminal records, BPSS, CTC, SC, DV) conducted for which roles or provide a supporting document (as a PDF file) as evidence.
Domain C Question
4
04) Is there a formal disciplinary process for employees who have breached company policy (including any breaches of company security policy)?
Answer yes if your organisation has a formal disciplinary process that is followed if an employee is found to have intentionally breached company policy. Please provide a document outlining the process (as a PDF file) as evidence (this may be covered by your organisation's Disciplinary Policy).
Domain L Question
7
07) What are your scope 1 emissions (tonnes of CO2 equivalent per year)?
Please enter the most recent measurement for your scope 1 emissions in tonnes of CO2 equivalent. Please state when this was last measured and provide further information on the scope and method of measurement, if applicable, in the notes section. If you do not measure scope 1 emissions, please enter zero as your numerical answer and state this clearly in the notes section.
Domain L Question
8
08) What are your scope 2 emissions (tonnes of CO2 equivalent per year)?
Please enter the most recent measurement for your scope 2 emissions in tonnes of CO2 equivalent. Please state when this was last measured and provide further information on the scope and method of measurement, if applicable, in the notes section. If you do not measure scope 2 emissions, please enter zero as your numerical answer and state this clearly in the notes section.
Domain L Question
9
09) What are your scope 3 emissions (tonnes of CO2 equivalent per year)?
Please enter the most recent measurement for your scope 3 emissions in tonnes of CO2 equivalent. Please state when this was last measured and provide further information on the scope and method of measurement, if applicable, in the notes section. If you do not measure scope 3 emissions, please enter zero as your numerical answer and state this clearly in the notes section.
Defend against supply chain attacks with Defend-As-One.
No organisation is an island.
Varaa aika esittelyyn
Churchill House, 142-146 Old St
London, EC1V 9BW
Yhdistynyt kuningaskunta