Logistics Integration Security & Resilience Assessment Form

1. Provider & Project Overview

This form evaluates whether adding the proposed logistics provider introduces cyber risk or resilience gaps. Please answer accurately; all data is used only for risk assessment.


Provider entity name

Primary service category

Project code or internal ticket

Is this a critical-path supplier (Tier-0 or Tier-1)?


2. Security Certifications & Governance

Which external security certifications does the provider currently hold?

Is the provider willing to share the latest external audit summary?


Security governance model used by provider

Does the provider maintain a NIST-aligned ISMS?


3. Data Classification & Handling

Categories of data exchanged (select all that apply)

Will any data be stored outside your primary region?


Is data encrypted in transit with TLS 1.3 or higher?


Is data encrypted at rest using AES-256 or equivalent?


4. Identity & Access Management

Authentication mechanism for API and dashboard access

Is MFA mandatory for all privileged accounts?


Maximum privilege access duration (in hours) before automatic re-authorisation

Are service accounts rotated at least every 90 days?


5. Network Security & Attack Surface

Is the provider’s production network segmented from corporate IT?


Are production APIs protected by a WAF with OWASP Top-10 ruleset?


Are external penetration tests conducted at least annually?


Is a bug-bounty or responsible-disclosure program active?


6. Disaster Recovery & Business Continuity

Provider’s committed RPO (Recovery Point Objective) in minutes

Provider’s committed RTO (Recovery Time Objective) in minutes

Is there a documented failover to a secondary region/cloud?


Are backups immutable (WORM or equivalent)?


Has the provider tested DR in the last 12 months?


7. DevOps & Change Management

Is Infrastructure-as-Code (IaC) used for all production changes?


Are container images scanned for CVEs before deployment?


CI/CD pipeline maturity level

Are canary/blue-green deployments used for critical services?


Is a post-mortem culture enforced for Sev-1 incidents?


8. Monitoring, Logging & Alerting

Are security logs forwarded to a SIEM with 24×7 SOC?


Log retention period (days) for transactional data

Is real-time anomaly detection enabled for API abuse?


Will the provider share raw logs with your team under NDA?


9. Compliance & Audit Rights

Do contractual terms grant you audit rights (right to audit)?


Is the provider prohibited from sub-processing without consent?


Are there financial penalties for SLA breaches (security-related)?


10. Supply-Chain & Software Bill of Materials (SBOM)

Can the provider produce an SBOM for all delivered software?


Are third-party libraries scanned for vulnerabilities weekly?


Is the provider compliant with EO 14028 or equivalent supply-chain standard?


11. Risk Matrix & Final Attestation

Please rate the likelihood and impact of the following risks (1 = Very Low, 5 = Critical)

Very Low

Low

Medium

High

Critical

Data breach during transit

Ransomware affecting operations

Insider threat (malicious or accidental)

Regulatory non-compliance fine

Extended outage (> SLA) during peak season

Summarise the top three residual risks and mitigations:

Do you attest that all answers are accurate to the best of your knowledge?

Authorised signatory

Let's brainstorm some seriously fun ways to tweak this form template! What's your first crazy idea? 🤪 Edit this Logistics Integration Security & Resilience Assessment Form
If you've got a specific journey in mind for your users, Zapof lets you design forms exactly how you want them – with questions that appear and disappear like secret messages based on what people say!
This form is protected by Google reCAPTCHA. Privacy - Terms.
 
Built using Zapof