UM Vendor Risk Management Standard

Body

 

   
Issued Under Authority of UM Information Security Policy
Responsible Office UM Information Security Office
Category Asset and Acquisition Management

IN PLAIN LANGUAGE

This standard helps the University manage the risks that come with using third-party vendors and online services. Any vendor that stores, processes, or has access to University Data — including cloud services and free or low-cost tools — must be reviewed to ensure they meet basic security and privacy expectations. The review process scales with risk, so higher-risk vendors receive more scrutiny. This protects the University, our students, and our data while allowing departments to use external tools responsibly and with clear approval.


1. Purpose

The purpose of this Standard is to establish minimum, risk-based requirements for assessing, approving, and managing information security risks associated with third-party vendors and service providers. Effective vendor risk management protects University Data, supports compliant procurement, and reduces exposure to cybersecurity, privacy, and operational risks throughout the vendor lifecycle.

This Standard aligns with the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) 2.0 and supports the University's Information Security Program.


2. Scope

This Standard applies to all third-party vendors, service providers, and partners that:

  • Store, process, transmit, or have access to University Data
  • Integrate with University systems, applications, or identity services
  • Provide cloud, hosted, or software-as-a-service (SaaS) solutions for University business
  • Are used institutionally, including no-cost or freemium services

This Standard applies to new procurements, renewals, and material changes to existing vendor relationships, regardless of funding source or procurement method.


3. Roles and Responsibilities

3.1 Chief Information Security Officer (CISO)

The CISO is responsible for:

  • Establishing and maintaining this Standard
  • Approving vendor risk assessment outcomes and exceptions
  • Exercising authority to approve, conditionally approve, delay, or deny vendor use based on security risk
  • Escalating material vendor risks to executive leadership

3.2 Information Security Office (ISO)

The Information Security Office is responsible for:

  • Operating the vendor risk assessment capability
  • Conducting security reviews and due diligence
  • Coordinating with Data Stewards, Legal Counsel, Procurement, and other stakeholders
  • Documenting risk findings and recommendations

3.3 Procurement and Business Units

Procurement staff and requesting units are responsible for:

  • Initiating vendor risk assessment prior to procurement or contract execution
  • Providing accurate and complete information about vendor use cases and data handling
  • Complying with approval conditions and remediation requirements

4. Vendor Risk Assessment Triggers

A vendor risk assessment is required when a vendor:

  • Stores, processes, or transmits University Data
  • Integrates with University identity systems (e.g., SSO, provisioning)
  • Provides cloud, hosted, or SaaS services used for University business
  • Is provided at no cost but used institutionally
  • Handles Restricted (Moderate Risk) or Confidential (High Risk) Data, even for a single department

5. Risk-Based Assessment Model

Vendor risk assessments must be conducted using a tiered, risk-based approach based on data classification, hosting model, and system integration.

5.1 Assessment Types

Full Vendor Risk Assessment — Required for vendors presenting higher risk due to data sensitivity, cloud hosting, or system integration.

Partial Vendor Risk Assessment — Required for vendors presenting lower risk or limited data exposure.

Amended Vendor Risk Assessment — Used for low-risk scenarios or approved exception cases.

Assessment depth and documentation requirements scale with risk.


6. Assessment Methods and Documentation

6.1 Default Assessment Tools

  • The Higher Education Community Vendor Assessment Tool (HECVAT) is the default assessment instrument
  • SOC 2 Type II or equivalent third-party assurance reports may be accepted where appropriate
  • Additional documentation may be required based on risk or regulatory considerations

6.2 Documentation Expectations

Vendors may be required to provide:

  • Completed security assessment questionnaires
  • Independent audit or assurance reports
  • Security and privacy policies
  • Incident response and business continuity documentation

7. Approval, Conditions, and Exceptions

7.1 Approval Outcomes

Vendor risk assessments may result in approval, conditional approval with required mitigations, delay pending additional information or remediation, or denial based on unacceptable risk.

7.2 Exceptions

Exceptions to assessment requirements may be granted on a case-by-case basis when justified by risk.

  • Exceptions must be documented
  • Compensating controls must be identified where applicable
  • All exceptions require CISO approval

Contracts with vendors that handle University Data must include security provisions addressing:

  • Data protection and confidentiality
  • Incident and breach notification
  • Cooperation with investigations and audits
  • Termination rights for security non-compliance

9. Ongoing Monitoring and Reassessment

  • Higher-risk vendors must undergo periodic reassessment
  • Reassessment is required upon renewal, material change, or security incident
  • Vendor security posture must be monitored throughout the relationship lifecycle

10. Incident Notification and Response

Vendors must:

  • Notify the University promptly of security incidents affecting University Data
  • Cooperate with investigations, containment, and remediation activities
  • Provide relevant evidence or documentation as requested

Vendor incident response obligations must align with the University Incident Response Standard.


11. Enforcement and Risk Response

When vendor security requirements are not met and no approved exception exists:

  • Additional controls or restrictions may be imposed
  • Vendor services may be suspended or terminated
  • Risk may be escalated to appropriate management or executive leadership

12. Review and Maintenance

This Standard must be reviewed at least annually and updated as necessary to reflect changes in risk, technology, regulatory requirements, or institutional processes.


13. References

  • UM Information Security Policy
  • UM Vulnerability Management Standard
  • UM Endpoint Management & Configuration Standard
  • UM Audit Log Management Standard
  • UM Cloud Computing Security Standard
  • NIST Cybersecurity Framework (CSF) 2.0
  • Center for Internet Security (CIS) Benchmarks
  • Montana University System BOR Policy 1300

Details

Details

Article ID: 171023
Created
Thu 3/19/26 4:56 PM
Modified
Thu 4/9/26 11:40 AM