1. Purpose of This Guide
This guide helps you collect evidence showing that your vendors and contractors are required to meet cybersecurity expectations, not just your internal team.
This matters because:
-
Vendors are a common supply-chain attack path
-
Weak vendor security can undo your own controls
-
You’re expected to set minimum cyber requirements, not just “trust them”
This evidence proves you’ve told your vendors:
“If you work with us, cybersecurity is part of the deal.”
2. What You Will Submit
You will submit evidence that vendors are required to follow cybersecurity rules, such as:
-
Contract clauses or agreements that include cybersecurity requirements
-
Vendor security declarations or questionnaires
-
Procurement or onboarding documents stating minimum cyber controls
-
Screenshots or PDFs showing:
-
Vendor cyber requirements
-
Incident notification obligations
-
Security standards vendors must follow (e.g. Cyber Essentials, ISO 27001)
-
This is governance evidence, not a technical system screenshot.
3. How to Collect / Obtain / Generate This Evidence
Option A: Contract or Agreement (Most Common)
-
Open a vendor or contractor agreement
-
Locate sections covering:
-
Cybersecurity obligations
-
Data protection requirements
-
Incident or breach notification
-
-
Export or screenshot the relevant pages only
-
Redact pricing or commercial terms if needed
💡 Even a single paragraph stating vendors must follow cybersecurity requirements is enough.
Option B: Vendor Cybersecurity Requirements Document
-
Create a simple document or PDF titled:
- “Vendor Cybersecurity Requirements”
-
Include statements such as:
-
Vendors must protect systems used to deliver services
-
Vendors must report cybersecurity incidents affecting your data
-
Vendors must maintain reasonable security controls
-
-
Save as PDF and upload
This works especially well if contracts are short or informal.
Option C: Vendor Security Review or Questionnaire (Best Practice)
-
Use a simple checklist or questionnaire
-
Capture answers such as:
-
Do you follow recognised security standards?
-
Do you have an incident response process?
-
Will you notify us of a breach?
-
-
Save the completed document or screenshot the responses
This supports A.6.4.E nicely, but is not mandatory.
5. Evidence Format
Accepted file types
-
PDF
-
PNG / JPG
Suggested naming format
YourCompanyName_VendorCompliance_Date
Example
AcmePteLtd_VendorCompliance_2025-07-01.pdf
5. What “Good” Looks Like
Your evidence is strong if it shows:
-
Visible element: Explicit cybersecurity requirements for vendors
Why it matters: Proves expectations are clearly communicated -
Visible element: Incident reporting or notification obligation
Why it matters: Demonstrates preparedness for supply-chain incidents -
Visible element: Applies to vendors or contractors (not just staff)
Why it matters: Directly satisfies CSA third-party clauses -
Visible element: Recent or currently used documentation
Why it matters: Shows this is active, not forgotten paperwork
Simple, clear, and readable beats long and fancy.
6. Tips from Sir Stonk 🛡️
-
You don’t need enterprise-grade audits. A clear contractual requirement already meets the intent for most SMEs.
-
Focus on vendors that matter. IT providers, SaaS tools, developers, MSPs — not your office coffee supplier.
Supply-chain security doesn’t mean distrusting everyone.
It means setting the rules before the drawbridge comes down.4