What is SIG
The SIG is a questionnaire that can help organizations manage supply chain-related risk. The SIG is particularly useful given the SIG controls are mapped to several other cybersecurity frameworks and guidelines, making it extensible across a number of use cases. The SIG questionnaire is available in 3 forms.
- SIG Core: The SIG Core questionnaire is a comprehensive assessment with over 700 questions that cover 21 risk domains. The SIG Core is typically used to assess organizations that store or manage highly sensitive or regulated information.
- SIG Lite: This preconfigured SIG template is designed to provide broad, but high-level information related to a vendor’s internal information security controls. This SIG Lite is typically used for lower-risk third parties.
- SIG Custom: The SIG Core or SIG Lite can be customized to meet an organization’s specific requirements. This can be helpful as certain risk domains may be more relevant for certain companies based on the nature of the services being outsourced.
The SIG covers the below 21 risk domains, which can be classified across 4 subjects.
Governance & Risk Management
- Compliance Management
- Enterprise Risk Management
- Environmental, Social, and Governance (ESG)
- Human Resources Security
- Information Assurance
- Nth Party Management
- Privacy Management
- Supply Chain Risk Management
Information Protection
- Access Control
- Application Management
- Cloud Services
- Endpoint Security
- Network Security
- Physical & Environmental Security
- Server Security
- Artificial Intelligence
IT Operations & Business Resilience
- Asset & Information Management
- IT Operations Management
- Operational Resilience
Security Incident & Threat Management
- Cybersecurity Incident Management
- Threat Management
New SIG Domains Indicate Increased Focus on Vendor Risk Management
The SIG is updated annually, and the risk domains are modified to reflect changes in the dynamic risk environment. Notably, Nth Party Management was introduced as a domain in 2023, and Supply Chain Risk Management and Artificial Intelligence (AI) domains were added for the 2024 edition. Below is a brief description of these risk domains.
- Nth Party Management: Organizations should implement and maintain a formalized Fourth-Nth Party risk governance plan and a continuous risk assessment process that will enable the organization to identify, quantify and prioritize Fourth-Nth Party risks based on the risk acceptance levels relevant to the organization. Nth party risks refer to those posed to your organization through the relationships a third-party vendor has with its own suppliers.
- Supply Chain Risk Management: Organizations should establish Cybersecurity Supply Chain Risk Management (C-SCRM) program standards that encompass the entire life cycle, from development to maintenance. These program standards can be achieved through research, resource provision, and stakeholder collaboration and will help organizations effectively manage cybersecurity risks in their supply chains.
- Artificial Intelligence (AI): The practice of understanding AI’s impacts, limitations, and enhancements to its performance, reliability, trustworthiness, and effectiveness. The organization should set goals and implement standards to assist AI developers, users, and evaluator systems reduce AI-related risks to individuals, organizations, society, and the environment.
The addition of the Nth Party Management and Supply Chain Risk Management domains reflects the heightened focus on risk related to an organization’s vendor network or supply chain. Utilizing the SIG not only serves as an effective method for assessing the maturity of your vendors’ vendor risk management programs, but it also demonstrates to customers and partners that your organization maintains robust controls for managing vendor-related risks.
How ProcessBolt Can Help
ProcessBolt offers the SIG questionnaire as part of our comprehensive, AI-driven vendor risk management platform. Organizations can leverage the SIG Core or SIG Lite, or we can work with your team to customize the SIG questionnaire based on your specific business objectives.
In addition to gaining access to the SIG questionnaire via ProcessBolt, organizations can leverage ProcessBolt AI to auto-populate responses to the SIG questionnaire based on vendor corporate documentation and attack surface data. This novel application of AI frees up internal resources to focus on other strategic priorities, provides instant verification of assessment responses with AI-generated citations, and accelerates the time to complete risk assessments.
Get in touch today to learn how we can help you leverage SIG as part of your vendor risk management program.