Purpose: To assess the security posture of vendors who may access or process customer Personally Identifiable Information (PII). To assess additional risks associated with vendors involved in AWS infrastructure and software development.
Vendor Security Questionnaire
Submission Instructions:
Please fill out all relevant sections of this questionnaire and return it to the eXpress Badging Security Team at info@expressbadging.com. Please add any hyperlinks, attachments, or relevant content you wish to include.
If you have any questions or need any help, please feel free to contact the same email address.
TABLE OF CONTENTS
Section 1: General Vendor Security Questionnaire
- General Vendor Information
- Organizational Security Governance
- Data Protection and Privacy
- Logical Access Control
- Incident Response
- Vendor Management
- Compliance and Certifications
Section 2: AWS Tech Stack & Code Development Supplement
Section 1: General Vendor Security Questionnaire
-
General Vendor Information
-
Company Name:
-
-
-
Primary Contact
-
Name:
-
Title:
-
-
Contact Information
-
Email:
-
Phone:
-
-
Company Website:
-
Physical Address:
- Line 1:
- Line 2:
- CSZ:
-
Type of Services Provided:
- Services:
-
Duration of Business Operations:
- From:
- To:
-
Number of Employees:
-
Geographical Locations of Operations:
-
Do you subcontract any services?
-
Yes
-
No
-
If yes, please provide details.
-
-
-
Organizational Security Governance
- Does your organization have a documented cybersecurity policy?
- Yes
- No
- If yes, please provide a summary or a copy
- Who is responsible for cybersecurity within your organization?
- Name
- Title
- Do you have a dedicated Information Security team?
- Yes
- No
- Has your organization adopted any cybersecurity frameworks or standards (e.g., NIST CSF, ISO 27001)?
- Yes
- No
- If yes, please specify.
- Does your organization have a documented cybersecurity policy?
-
Data Protection and Privacy
-
Does your organization have policies and procedures in place to protect customer PII
-
Yes
-
No
-
-
How is customer PII stored and transmitted? Please describe the encryption methods used.
- At Rest
- Yes
- No
- If yes, state the method
- In Transit
- Yes
- No
- If yes, state the method
- At Rest
- Do you conduct regular data privacy training for employees?
- Yes
- No
- Have you experienced any data breaches in the past 24 months?
- Yes
- No
- If yes, please provide details.
-
-
Logical Access Control
-
How do you manage user access to systems containing customer PII?
Outline processes for user activation, monitoring, inactivation, granting full access when necessary, and providing limited access for general use by the same user.- Process:
-
Do you implement multi-factor authentication (MFA) for system access?
-
Yes
-
No
-
- Are contracted non-employee workers given access to customer or end-user provided PII data?
- Yes
- No
- If yes, provide your vetting and compliance process
-
-
Incident Response
- Do you have an incident response plan in place?
- Yes
- No
- How quickly are customers notified in the event of a data breach involving their PII?
- Process:
- Please describe your process for incident detection and response.
- Process:
- Do you have an incident response plan in place?
-
Vendor Management
- Do you use third-party vendors to process or store customer PII?
- Yes
- No
- Not Applicable
- If yes, how do you assess and monitor their security practices?
- Have contracts with third-party vendors been reviewed for data protection clauses?
- Yes
- No
- Not Applicable
- Do you use third-party vendors to process or store customer PII?
-
Compliance and Certifications
- Is your organization compliant with any of the following regulations? (Check all that apply)
- GDPR
- HIPAA
- CCPA
- Other (please specify): ____________
- Do you hold any security certifications? (e.g., ISO 27001, SOC 2)
- Yes
- No
- If yes, please provide details.
- Is your organization compliant with any of the following regulations? (Check all that apply)
Section 2: AWS Tech Stack & Code Development Supplement
-
AWS Infrastructure
- Do you manage or have access to any AWS environments related to eXpress badging?
- Yes
- No
- Are AWS environments configured following the principle of least privilege?
- Yes
- No
- How do you monitor and log activities within AWS environments?
- Process:
- Are AWS environments regularly audited for security compliance?
- Yes
- No
- Do you manage or have access to any AWS environments related to eXpress badging?
-
Software Development Practices
- Do you follow secure coding practices and guidelines?
- Yes
- No
- Are code reviews conducted regularly?
- Yes
- No
- Is static and dynamic code analysis performed?
- Yes
- No
- How are vulnerabilities in code identified and remediated?
- Process:
- Do you follow secure coding practices and guidelines?
-
Personnel and Access
-
Do any of your developers or contractors have access to production environments?
-
Yes
-
No
-
If yes, please describe the access controls that are in place.
-
-
Are background checks conducted for employees and contractors with access to sensitive systems?
-
Yes
-
No
-
-
Do you employ any foreign nationals in roles that have access to customer PII or sensitive codebases?
-
Yes
-
No
-
If yes, please specify countries and any additional safeguards in place.
-
-
-
Development and Deployment
-
Do you use any third-party code libraries or frameworks?
-
Yes
-
No
-
If yes, how do you assess their security?
-
-
Describe your process for deploying code to production environments.
-
Is there a rollback plan in case of deployment failures?
-
Yes
-
No
-
-