Skip to content
GitHubLinkedIn

Supplier security policy (draft)

This policy defines a draft structure for supplier security, aligned to ISO/IEC 27001 expectations. It does not list actual suppliers unless explicitly documented elsewhere.

OwnerInformation Security Officer
Contactinfra@lef.tec.br
Version0.1
Last updated2025-12-24
Review cadenceAnnual (and on material supplier changes)

Define how LEF evaluates, contracts with, and periodically reviews suppliers that can impact information security.

Applies to third parties that:

  • host, process, transmit, or access LEF/client data; or
  • provide core connectivity/security controls; or
  • materially affect availability of services in scope.

At minimum:

  • Confirm the service purpose, data involved, and access required.
  • Confirm authentication/access approach (SSO/MFA where supported).
  • Confirm data location/retention expectations (where relevant).
  • Record decision and owner.

Where applicable (by risk):

  • confidentiality obligations
  • incident notification expectations
  • subcontractor transparency
  • termination/offboarding expectations and data return/deletion
  • Review cadence based on criticality.
  • Re-evaluate on major changes (scope, pricing, feature changes, incidents).
  • Service facts (what it is, entry points, operational notes) live on the relevant /services/** page.
  • This policy describes the process and expectations; it should not duplicate service inventories.
  • Supplier register (in-scope suppliers + criticality):
  • Due diligence artifacts and approvals:
  • Periodic supplier reviews: