Logistics Integration Security & Resilience Assessment Form

1. Provider & Project Overview

This form evaluates whether adding the proposed logistics provider introduces cyber risk or resilience gaps. Please answer accurately; all data is used only for risk assessment.

 

Provider entity name

Primary service category

Project code or internal ticket

Is this a critical-path supplier (Tier-0 or Tier-1)?

 

Describe contingency plan if this provider fails:

2. Security Certifications & Governance

Which external security certifications does the provider currently hold?

Is the provider willing to share the latest external audit summary?

 

Explain why and propose compensating controls:

Security governance model used by provider

Does the provider maintain a NIST-aligned ISMS?

 

Most recent NIST CSF maturity score (0-4):

3. Data Classification & Handling

Categories of data exchanged (select all that apply)

Will any data be stored outside your primary region?

 

List jurisdictions and mechanism used (e.g. SCC, BCR):

Is data encrypted in transit with TLS 1.3 or higher?

 

Describe current cipher suites and upgrade roadmap:

Is data encrypted at rest using AES-256 or equivalent?

 

Detail algorithm, key rotation frequency, and HSM usage:

4. Identity & Access Management

Authentication mechanism for API and dashboard access

Is MFA mandatory for all privileged accounts?

 

List compensating controls (e.g. IP whitelisting, hardware tokens):

Maximum privilege access duration (in hours) before automatic re-authorisation

Are service accounts rotated at least every 90 days?

 

Provide rotation frequency and process:

5. Network Security & Attack Surface

Is the provider’s production network segmented from corporate IT?

 

Explain isolation approach or compensating controls:

Are production APIs protected by a WAF with OWASP Top-10 ruleset?

 

Detail WAF vendor, rule update cadence, and custom rules:

Are external penetration tests conducted at least annually?

 

Most recent test completion date:

 

Explain rationale and alternative assurance activities:

Is a bug-bounty or responsible-disclosure program active?

 

Program URL or contact:

6. Disaster Recovery & Business Continuity

Provider’s committed RPO (Recovery Point Objective) in minutes

Provider’s committed RTO (Recovery Time Objective) in minutes

Is there a documented failover to a secondary region/cloud?

 

Describe current redundancy model:

Are backups immutable (WORM or equivalent)?

 

Detail backup protection mechanism:

Has the provider tested DR in the last 12 months?

 

Explain why and next test date:

7. DevOps & Change Management

Is Infrastructure-as-Code (IaC) used for all production changes?

 

Describe manual processes and risk mitigation:

Are container images scanned for CVEs before deployment?

 

Detail scanning tools, CVSS threshold, and waiver process:

CI/CD pipeline maturity level

Are canary/blue-green deployments used for critical services?

 

Explain current deployment strategy and rollback time:

Is a post-mortem culture enforced for Sev-1 incidents?

 

Average closure time for RCAs (days):

8. Monitoring, Logging & Alerting

Are security logs forwarded to a SIEM with 24×7 SOC?

 

Detail log retention, encryption, and review frequency:

Log retention period (days) for transactional data

Is real-time anomaly detection enabled for API abuse?

 

Describe detection mechanisms and false-positive rate:

Will the provider share raw logs with your team under NDA?

 

Explain restrictions or aggregation policies:

9. Compliance & Audit Rights

Do contractual terms grant you audit rights (right to audit)?

 

Explain restriction and any third-party attestation substitution:

Is the provider prohibited from sub-processing without consent?

 

Detail sub-processor management process:

Are there financial penalties for SLA breaches (security-related)?

 

Penalty as % of monthly fees or fixed amount:

10. Supply-Chain & Software Bill of Materials (SBOM)

Can the provider produce an SBOM for all delivered software?

 

Explain plan to achieve SBOM generation:

Are third-party libraries scanned for vulnerabilities weekly?

 

Detail scanning cadence and escalation path:

Is the provider compliant with EO 14028 or equivalent supply-chain standard?

 

List current gaps and remediation timeline:

11. Risk Matrix & Final Attestation

Please rate the likelihood and impact of the following risks (1 = Very Low, 5 = Critical)

Very Low

Low

Medium

High

Critical

Data breach during transit

Ransomware affecting operations

Insider threat (malicious or accidental)

Regulatory non-compliance fine

Extended outage (> SLA) during peak season

Summarise the top three residual risks and mitigations:

Do you attest that all answers are accurate to the best of your knowledge?

Authorised signatory

To configure an element, select it on the form.

To add a new question or element, click the Question & Element button in the vertical toolbar on the left.