Prior to the adoption of any new third-party service a risk assessment is required to be undertaken by the ISTS Cyber Security team to ensure that the business owner of the service acknowledges the risks involved in storing University data in an external system.
Cyber Security risk assessments are driven by university policy and ensure that appropriate organisational and legislative obligations are adhered to.
What do I need to do?
- You need to know the exact nature of the data that will be stored in the 3rd party system.
- This data should be correctly classified as per the UniSA Information Security Policy. The cyber security team is not responsible for classifying your data.
- If UniSA Legal have not already reviewed the terms and conditions of any contractual agreements prior to engaging the cyber security team, we may request that this is done if the risk and/or data is not classified as low.
- You need to ensure that the information provided in the initial request form is complete and accurate.
What will the cyber security team do?
The Cyber Security team will assess the information provided and then:
- Perform a technical solution review.
- Perform an assessment of the information security maturity of the vendor.
- Liaise with the Chief Information Security Officer for endorsement of the proposed solution.
- Seek executive level review and acceptance.
- Communicate outcomes to the business owner of the proposed solution.
What does the vendor need to do?
As part of the University’s vendor due diligence process, we need to have an adequate level of comfort that the vendor has sufficient security controls in place to protect UniSA digital assets.
- The vendor will be provided with an initial security questionnaire which gives the vendor the opportunity to provide evidence of their information security practices (We ask that this is completed as soon as practicable as it will determine if a more detailed questionnaire is required).
- Provide supporting documentation that substantiates their information security capability.
The ISTS Cyber Security team has an advisory role only in the assessment process. Should risks be identified risk acceptance is a decision for the business owner in line with the university risk management framework.