CIS Control 15: Service Provider Management
DEEP DIVEAddresses third-party risk and supply chain security. Updating to provide cohesive navigation to the central CIS Critical Security Controls v8 page.
Modern enterprises rely heavily on third-party vendors, cloud providers, and managed services to conduct business. CIS Control 15: Service Provider Management establishes a framework for evaluating and managing the risks associated with these external entities. As part of the broader CIS Critical Security Controls Version 8, this control provides a structured approach to supply-chain security, ensuring that vendors adhere to your organization's security standards from onboarding through contract termination.
Supply chain compromises have become a primary vector for sophisticated cyber attacks. By implementing the safeguards in Control 15, organizations can effectively monitor external risk and minimize the potential impact of a vendor-related security breach.
Implementation Group Progression
Control 15 scales across the three Implementation Groups (IGs), adding rigor as organizational maturity increases:
- IG1 (Essential): Focuses solely on establishing an inventory of service providers (15.1).
- IG2 (Enhanced): Introduces policy management (15.2), classification (15.3), and contractual security requirements (15.4).
- IG3 (Advanced): Requires active assessment (15.5), continuous monitoring (15.6), and rigorous decommissioning procedures (15.7).
Core Safeguards and Best Practices
Inventory and Policy Lifecycle (15.1 & 15.2)
You cannot secure what you do not know about. Establishing an Inventory of Service Providers (Safeguard 15.1) is the foundation of vendor risk management. This inventory must list all known service providers, classify them, and designate an internal enterprise contact (business owner) for each. This helps mitigate the risks of "Shadow IT" where departments purchase SaaS applications without security oversight. Establishing this inventory should be done in tandem with CIS Control 2: Inventory and Control of Software Assets.
The Service Provider Management Policy (Safeguard 15.2) dictates the rules of engagement. This policy must document the complete vendor lifecycle, including inventory generation, risk assessment, continuous monitoring, and secure decommissioning.
Vendor Classification (15.3)
Not all vendors pose the same level of risk. Safeguard 15.3 requires organizations to classify service providers based on characteristics such as:
- Data Sensitivity and Volume: A payroll provider storing PII requires stricter controls than a vendor providing public marketing analytics. (See CIS Control 3: Data Protection).
- Availability Requirements: Is the vendor in the critical path for your organization's uptime?
- Applicable Regulations: Does the vendor handle PCI-DSS, HIPAA, or GDPR-regulated data?
- Inherent vs. Mitigated Risk: Assessing the risk before and after security controls are applied.
Example Edge Case: A vendor may only process low-sensitivity data but requires deep administrative access to your network to function. Due to the high level of access, this vendor should be classified as high-risk, regardless of the data type.
Contractual Security Requirements (15.4)
Security expectations must be legally binding. Ensure service provider contracts include specific security clauses. Key requirements to embed in Master Services Agreements (MSAs) include:
- Minimum security program requirements (e.g., ISO 27001 or SOC 2 compliance).
- Data breach notification timelines. This directly supports your CIS Control 17: Incident Response Management procedures.
- Data encryption requirements for data in transit and at rest.
- Mandatory data disposal commitments upon contract termination.
Assessment and Continuous Monitoring (15.5 & 15.6)
For IG3 organizations, validating vendor security posture is mandatory.
- Assess Service Providers (15.5): Evaluate vendors using standardized assessment reports like a SOC 2 Type II or a Payment Card Industry (PCI) Attestation of Compliance (AoC). For nuanced risks, utilize customized questionnaires (e.g., SIG Core or CAIQ). Assessments should occur annually or upon contract renewal.
- Monitor Service Providers (15.6): Point-in-time assessments are insufficient for highly classified vendors. Continuous monitoring can include reviewing vendor release notes for security updates, utilizing third-party security rating platforms, and performing dark web monitoring to detect compromised vendor credentials.
Secure Decommissioning (15.7)
Offboarding a vendor is often the most overlooked phase of service provider management. When a contract is completed or terminated, organizations must securely decommission the provider to prevent lingering backdoor access or orphaned data.
Decommissioning activities must include:
- Account Deactivation: Revoke all vendor access, focusing heavily on VPN access, shared credentials, and API keys. Coordinate this with CIS Control 5: Account Management and CIS Control 6: Access Control Management.
- Termination of Data Flows: Disable any automated data feeds, webhooks, or syncing utilities that push corporate data to the provider's environment.
- Secure Data Disposal: Require proof that enterprise data within the service provider's systems has been securely destroyed. Refer to NIST 800-88r1: Guidelines for Media Sanitization to establish acceptable standards for data destruction.
Practical Considerations and Edge Cases
- Managed Security Service Providers (MSSPs): While an MSSP helps reduce organizational risk, they also represent a highly privileged third party. Ensure your MSSP is subjected to your most rigorous tier of vendor classification and assessment.
- Sub-processors (Nth-Party Risk): Your vendor's vendors can also compromise your data. Ensure your service provider management policy addresses sub-processor risk, requiring your direct vendors to mandate similar security controls downstream.
- Cybersecurity Insurance: Utilizing a third-party that holds comprehensive cybersecurity insurance can aid in risk reduction and financial recuperation in the event of a supply-chain breach, but it does not replace the need for technical due diligence.