Supplier & Third-Party Security Policy


Document Number: ISMS-POL-STP-01

Classification: L1 — Policy (Domain)

Version: 0.1.2

Effective Date: February 18, 2026

Author: Lucas Shin — Security Director

Approved By: Richard — CISO

Next Review Date: February 2027

Parent Policy: Information Security Policy (ISMS-POL-ISP-01)


1. Purpose

This policy defines the security requirements for third-party relationships — including SaaS tool providers, collaboration partners, contractors, and cross-tenant entities — to ensure that external parties do not introduce unacceptable risk to Cybercraft information assets.

This policy addresses the supply chain and external access dimension, complementing the internal controls defined in the M365 Workspace & Access Policy (ISMS-POL-M365-01) and personnel controls in the Human Resource Security Policy (ISMS-POL-HR-01).


2. Scope

2.1 Applicable Third Parties

2.2 Out of Scope


3. SaaS Tool Security Assessment

3.1 Assessment Requirement

Derived from BYOD Security Policy (ISMS-POL-BYOD-01) Section 7.1:

When a user requires a SaaS tool not available via VPP/managed deployment or not already approved, a security assessment must be conducted before use.

3.2 Assessment Criteria

CriterionMinimum RequirementEvidence
AuthenticationSupports SSO (SAML/OIDC) or MFAVendor documentation / settings page
Data ResidencyData stored in acceptable jurisdiction (AU, NZ, US, EU)Vendor privacy policy / data processing agreement
EncryptionTLS 1.2+ in transit; encryption at restVendor security page / SOC 2 report
Data ExportAbility to export/delete Cybercraft data upon contract terminationVendor terms of service
ComplianceSOC 2, ISO 27001, or equivalent (preferred, not mandatory for low-risk tools)Vendor compliance page / certificate
Data SharingNo sharing of Cybercraft data with third parties without consentVendor privacy policy
AI / ML Data HandlingTraining opt-out guarantee mandatory. Enterprise/Team Plan or above required for corporate data processing. Explicit prohibition on using customer data for model training required.Vendor AI policy / Terms of Service / Data Processing Agreement

3.3 Additional Assessment Criteria for AI Services

For services that include AI capabilities or are generative AI services, the following criteria must be assessed in addition to the baseline criteria in §3.2:

CriterionMinimum Requirement
Training Data PolicyContractual commitment that customer input data will not be used for model training
Data Retention PeriodInput data automatically deleted after session end, or retention period explicitly stated
Output OwnershipIntellectual property rights of AI outputs explicitly attributed to the customer
Access Path ControlVerify whether access via ADUE Managed Browser (Edge) is supported
Note: Post-approval operational policies for AI services (account separation, data context isolation, usage restrictions) are defined in the Application & Data Governance Policy (ISMS-POL-ADG-01).

3.4 Assessment Process

StepActionOwner
1User submits SaaS tool request with business justification and data types involvedEnd User
2Security Director evaluates against assessment criteria (§3.2; §3.3 additionally applied for AI services)Lucas
3Risk classification: High (handles Confidential data or AI with corporate data input), Standard (General data only)Lucas
4High-risk tools: CISO approval required. Standard tools: Security Director may approve.Lucas / Richard
5Approved tool added to Approved SaaS Register with review date. Operational policies applied per Application & Data Governance Policy (ISMS-POL-ADG-01).Lucas

3.5 Shadow IT Prevention


4. External Account and Guest Access Controls

4.1 Guest Account Management

Derived from BYOD Security Policy (ISMS-POL-BYOD-01) Section 2.3 and M365 Workspace & Access Policy (ISMS-POL-M365-01) Section 5:

Level 3 Collaboration Partners are granted Entra ID guest accounts with the following restrictions:

ControlRestriction
Teams accessDedicated Private Channel per partner/organisation only — no access to other teams or channels
Data visibilityFiles shared by Team Manager into partner's channel only — cannot see internal data
LicenceNo Cybercraft licence required (Guest account)
Technical controlsNo CA, Intune, MAM, or Defender — access controlled by Teams membership and NDA
DurationGuest access reviewed at project completion and at minimum annually

4.2 Guest Account Lifecycle

StepActionOwner
1Business owner requests guest access with justification and expected durationTeam Manager
2Security Director creates Entra ID guest account and assigns to dedicated Private ChannelLucas
3Guest signs NDA (if not already in place)Guest / CEO
4Quarterly review of all active guest accounts — remove stale accountsLucas
5On project/engagement completion: disable guest account, remove from channelLucas

5. Cross-Tenant Security (Cybercraft / Techtype / HVT)

Cybercraft operates a multi-tenant architecture with shared personnel across Cybercraft, Techtype, and HVT.

5.1 Trust Model

5.2 Cross-Tenant Personnel

PersonHome TenantResource Tenant(s)Control
Lucas ShinCybercraft (Premium)HVT (Basic)Cybercraft compliance enforced → HVT trusts
RichardCybercraft (Premium)HVT (Basic)Cybercraft compliance enforced → HVT trusts
JeffHVT (Premium)Cybercraft (Premium)HVT compliance enforced → Cybercraft trusts
FarahCybercraft (Premium)HVT (Premium), Techtype (Basic)Cybercraft compliance enforced → HVT/Techtype trusts
GageTechtype (Premium)HVT (Basic)Techtype compliance enforced → HVT trusts

6. Data Sharing Controls

6.1 Principles

6.2 Contractual Requirements

All third parties handling Cybercraft data must agree to:


7. Roles and Responsibilities

RolePersonResponsibilities
CEOFarahSupplier contract approval, NDA execution authority, business relationship ownership
CISORichardPolicy approval, high-risk SaaS tool approval, cross-tenant security architecture oversight
Security DirectorLucasSaaS assessment execution, guest account management, cross-tenant compliance monitoring, Approved SaaS Register maintenance
Team ManagerDesignated per teamRequest guest access, manage file sharing within partner channels, report suspicious partner activity

8. Compliance Mapping

ISO 27001 ControlRequirementCovered By
A.5.19Information security in supplier relationshipsSection 3 (SaaS assessment) + Section 6 (Data sharing controls)
A.5.20Addressing information security within supplier agreementsSection 6.2 (Contractual requirements)
A.5.21Managing information security in the ICT supply chainSection 5 (Cross-tenant security) + Section 3.2 (Assessment criteria)
A.5.22Monitoring, review and change management of supplier servicesSection 3.4 (Shadow IT prevention) + quarterly SaaS audit
A.5.23Information security for use of cloud servicesSection 3 (SaaS assessment criteria — authentication, encryption, data residency)

9. Document Control

VersionDateAuthorChanges
0.1.02026-02-18Lucas ShinInitial release — SaaS assessment framework, guest access controls, cross-tenant trust model, data sharing controls. Incorporates third-party elements from BYOD Security Policy.
0.1.12026-02-20Lucas ShinAdded §3.3 Additional Assessment Criteria for AI Services (AI/ML data handling, training opt-out, data retention, output ownership, access path). Separated AI from §3.2 Data Sharing criterion. Added AI risk classification and Application & Data Governance Policy linkage to §3.4 Assessment Process. Renumbered §3.4→§3.5.
0.1.22026-02-20Lucas ShinL2 policy reordering (renumbered). Updated all cross-reference document numbers to reflect new P-numbering scheme.

Review Schedule


[End of Policy Document]