NB Vendor Questionnaire v2.4
NB Vendor Questionnaire v2.4
NB Vendor Questionnaire v2.4
www.nb.com
Questionnaire Instructions:
1) Complete the Business Information tab.
2) Answer all of the questions on the High Level Assessment tab
by selecting either Yes, No or N/A from the drop-down list provided.
3) Use the "Additional Information" space to provide any pertinent
information. An explanation is required in this space if the response is N/A.
question)
Questionnaire Instructions: For each of the questions provided choose either Yes, No or N/A from the drop-down list provided. If N/A has been chosen then it is
mandatory to supply additional explanation. Use the "Additional Information field to the right of the question. Click on the instruction pop-up box and drag if
necessary.
Ques # Question/Request Response Additional Information
A. Risk Management ###
A.1 Does your company have a risk assessment program? Yes ###
B. Security Policy
B.1 Does your company have an information security policy? Yes ###
B.2 Are the following topics covered by your policies:
B.3 Acceptable use? Yes ###
B.4 Access control? Yes ###
B.5 Application security? Yes ###
B.6 Business Continuity?
B.7 Change control? Yes ###
B.8 Computer and communications systems access and use? Yes ###
B.9 Data handling? Yes ###
B.10 Disaster Recovery? Yes ###
B.11 Email? Yes ###
We have some applications that support
enctyptation. But not an overall encrypatation
B.12 Encryption? No process
B.13 Exception process? Yes ###
B.14 Information classification? Yes ###
B.15 Internet / Intranet access and use? Yes ###
B.16 Mobile computing? No ###
B.17 Network security? Yes ###
B.18 Operating system security? Yes ###
B.19 Physical access? Yes ###
N/A Additional
Information
B.20 Remote access? Provided Only for IT Support, not for users
B.21 Risk management? Yes ###
B.22 Secure Disposal? Yes ###
B.23 Security awareness? Yes ###
B.24 Security incident management? Yes ###
B.25 Use of personal equipment? No ###
B.26 Vulnerability management? Yes ###
C. Organizational Security
Is there an information security oversight function that provides clear direction
C.1 and visible management support for security initiatives within the organization? Yes ###
Is there an individual or group with responsibility for security within the
C.2 organization? Yes ###
Is an individual or group responsible for the implementation / execution of
C.3 security processes in support of policies? Yes group responsible
Is an individual or group responsible for ensuring compliance with security policies.
C.4 Yes group responsible
C.5 Are all constituents required to sign confidentiality agreements? Yes ###
Has there been an independent 3rd party review of the information security
C.6 program? (If so, note the firm in the "Additional Information" column.) No ###
C.7 Do you contract with third party service providers? Yes ###
D. Asset Management
D.1 Does your company have an asset management program? No ###
D.2 Is an inventory of hardware/software assets maintained? Yes ###
D.3 Is ownership assigned for information assets? Yes ###
D.4 Does your organization have an information classification policy in place?
Are documented procedures in place for the disposal and/or destruction of
D.5 physical media (e.g.: Paper documents, CDs, DVDs, tapes, disk drives, etc.)? Yes ###
Are documented procedures in place for the reuse of physical media (e.g.: Tapes,
D.6 disk drives, etc.)? No ###
E. Human Resource Security
E.1 Does your company have a pre-screening policy?
Do you perform any background screening of applicants? This would include
E.2 criminal, credit, professional/academic, references and drug screening.
Are new hires required to sign any agreements that pertain to non/disclosure,
E.3 confidentiality, acceptable use or code of ethics upon hire?:
E.4 Does your organization have a security awareness training program? Yes ###
Are information security personnel required to obtain professional security
E.5 certifications (e.g., GSEC, CISSP)? No ###
Do you communicate Information Security Policies and procedures to
E.6 constituents? Yes ###
Are your constituents required to re-read and re-accept policies, code of conduct,
E.7 non-disclosure or confidentiality agreements?
Is there a disciplinarily process in place for non-compliance with Corporate Policy?
E.8
E.9 Does your company have termination policy?
Does your HR department notify security / access administration of termination of
E.10 constituents?
Does your HR department notify security/access administration of a constituent's
E.11 change of status? Yes ###
E.12 Does your organization have Asset return procedures or policies in place? Yes ###
F. Physical and Environmental Security
F.1 Does your company have a Physical Security policy?
F.2 Does the building that contains the target data reside on a campus? No ###
F.3 Is the building shared with other tenants? Yes ###
F.4 Do you have a CCTV system monitoring all of your office locations? Yes ###
F.5 Do you have a CCTV system monitoring your data center(s) No ###
F.6 Are all office entry and exit points alarmed? Yes ###
Are all data center entry and exit points alarmed? We do not have a physical data center.
F.7 No Information resides on the cloud.
F.8 Do you use security guards? No Only in the bulding access
F.9 Do you restrict access to your data center facility? Yes ###
F.10 Do you allow visitors in your data center facility? No ###
F.11 Do you restrict access to your offices? Yes ###
F.12 Do you allow visitors in your offices? Yes ###
F.13 Do the target systems reside in a data center? Yes ###
F.14 Does your data center facility contain a Battery/UPS Room? Yes ###
F.15 Does your data center facility contain a Generator or Generator Area? Yes ###
F.16 Do your office facilities contain a Battery/UPS Room? Yes ###
F.17 Do your office facilities contain a Generator or Generator Area? Yes ###
F.18 Does your organization use a printer room to print target data? Yes ###
F.19 Do you have a secured work area where employees access target data? Yes ###
G. Communications and Operations Management
Does you organization have a formal change management / change control
G.1 process? Yes ###
Does your organization segregate duties between individuals granting access and
G.2 those who access target data? Yes ###
Does your Organization outsource to any third party vendors who will have access
to target data (consider backup vendors, service providers, equipment support
vendors, etc)?
G.3 Yes ###
Are internal users required to pass through a content filtering proxy prior to
G.4 accessing the Internet? No ###
G.5 Do you perform system backups of target data? Yes ###
G.6 Is every connection to an external network terminated at a firewall? Yes ###
G.7 Do you allow the use of wireless networking technology in your organization? Yes ###
G.8 Do you allow wireless access (WiFi) to your corporate network at your facilities? Yes ###
Do you regularly scan your organization's facilities for rogue wireless access
G.9 points? Yes ###
G.10 Is there a list of authorized analog lines within the organization's facilities? No We do not have analog lines
Are any analog modems used or installed in your environment? This would include
G.11 "Phone Home" modems attached to systems. No ###
Are any DSL modems used or installed in your environment? This would include
G.12 "Phone Home" modems attached to systems. No ###
Are any cable modems used or installed in your environment? This would include
G.13 "Phone Home" modems attached to systems. No ###
Does your organization use any removable media (e.g.: CDs, DVD, tapes, disk
G.14 drives, USB devices, etc)? Yes ###
G.15 Does your company use external Instant Messaging? Yes ###
Does your organization use application Servers for processing or storing
G.16 confidential data?
Are logs generated for security relevant activities on network devices, operating
G.17 systems, and applications? Yes ###
G.18 Do systems and network devices utilize a common time synchronization service? Yes ###
Does your company use UNIX or Linux operating systems for storing or processing
G.19 target data? No ###
Does the company use Windows systems for storing or processing confidential
G.20 data? Yes ###
G.21 Does the company use a mainframe for storing or processing target data? No ###
G.22 Does the company use an AS400 for storing or processing target data? No ###
Are network devices periodically monitored for continued compliance to security
G.23 requirements? Yes ###
G.24 Does the company provide Web services? No ###
Does your company use mobile computing devices (laptops, tablets, smart phones
G.25 etc.) to store, process or access target data? No ###
G.26 Does your company use, manage or maintain any encryption tools? Yes Winrar, 7zip, Bitlocker
G.27 Do you require data encryption for confidential data in transit? Yes ###
G.28 Do you require data encryption for confidential data at rest? Yes ###
G.29 Does your company utilize Digital Certificates? No ###
H. Access Control
H.1 Is an access control policy in place? Yes ###
Is access to all systems and applications based on defined roles and
H.2 responsibilities or job functions? Yes ###
H.3 Is multi-factor authentication deployed for “high-risk” environments? Yes ###
Is multi-factor authentication utilized for remote access? No ###
H.4 Does your company utilize unique user IDs to access company systems? Yes ###
Are there formal processes in place to grant and approve access to systems
H.5 holding, processing, or transporting target data? Yes ###
Do you use password to access systems holding, processing, or transporting target
H.6 data? Yes Sometimes depending on the specific activity
Are there formal processes in place to regularly review access to ensure that only
H.7 those people with a need-to-know currently have access? Yes ###
H.8 Do you use electronic systems to store, process, transport, etc. target data? Yes ###
H.10 Is a remote access solution present in the environment? Yes ###
H.11 Is a teleworking/ remote working policy in place? Yes ###
I. Information Systems Acquisition Development and Maintenance
I.1 Does your company perform any type of application development? No ###
I.2 Do you perform any type of application testing? No ###
Does the company have an internal organization that provides project
I.3 management oversight? No ###
Does the company have an independent quality assurance function responsible
I.4 for the testing of software and infrastructure prior to implementation? Yes ###
Does your organization support or maintain a development, test, staging, QA or
I.5 production environment? No ###
I.6 Do you have a documented change control process? No ###
I.7 Does your organization patch systems and applications? Yes ###
I.8 Are systems and networks periodically assessed for vulnerabilities? Yes ###
I.9 Do you support, host, maintain, etc. a web site with access to target data? No ###
Do you use or have installed on any system penetration, threat or vulnerability
I.10 assessment tools? No ###
J. Information Security Incident Management
J.1 Does your company have an Incident Management policy? No ###
Does your company have a formal information security Incident Response
J.2 Program / Plan? Yes ###
Does your company have a security incident response team with clearly defined
J.3 and documented roles and responsibilities? Yes ###
J.4 Is an Incident Response contact list or calling tree maintained? Yes ###
Is documentation maintained on previous incidents, outcomes and issues and
J.5 their remediation? No ###
K. Business Continuity Management
Does your company have a written policy for business continuity and disaster
K.1 recovery.
L. Compliance
Is your organization required to comply with any legal, regulatory or industry,
L.1 requirements, etc. (GLBA, SOX, PCI)? Yes ###
L.2 Is your organization required to comply with any SEC regulations? No ###
Within the last year, has there been an independent review of the company’s
L.3 security policies, standards, procedures, and/or guidelines? Yes ###
L.4 Has a network penetration test been conducted within the last year? No ###
L.5 Does the organization undergo a SSAE16 Type II examination at least annually? No ###