Supply-Chain Security · SC-Q05

Question: Are suppliers monitored for security incidents, performance degradation, or regulatory non-compliance?

Why This Matters

Continuous monitoring detects early signs of supplier failure or compromise. Visibility enables swift containment before cascading impact.

Maturity

0 — Unaware
No post-onboarding monitoring.
1 — Ad Hoc
Reviews triggered only after issues arise.
2 — Defined
Quarterly reviews of critical vendors using basic KPIs.
3 — Managed
Feeds from news, CERT, and SOC integrated into monitoring.
4 — Integrated
Automated alerts for breaches, expiries, and SLA breaches.
5 — Optimized
Predictive analytics flag at-risk vendors before incidents occur.

How to Level Up

| From → To | Actions | |—|—| | 0 → 1 |Log supplier issues manually in a register.| | 1 → 2 |Define quarterly performance/security review schedule.| | 2 → 3 |Subscribe to breach and news monitoring for key vendors.| | 3 → 4 |Automate feeds (CERT-In, Have I Been Pwned, RSS).| | 4 → 5 |Correlate vendor risk with incident and SLA data for forecasting.|

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

| Purpose | Tool | Notes | |—|—|—| | News feeds | RSS + n8n | Breach alerts per domain | | Tracking | Airtable | Vendor issue register | | Visualization | Metabase | Trend dashboard |

Common Pitfalls

Compliance Mapping

| Standard | Clauses / Notes | |—|—| | ISO/IEC 27001 | A.5.19 (Monitoring supplier services) | | NIST CSF 2.0 | ID.SC-06 / DE.AE | | DPDP Act 2023 | Processor breach notification duty | | NIRMATA Mapping | SC-Q05 establishes continuous supplier assurance. |