SCA – Standardized Control Assessment Procedure Products
When scoped, the standardized set of assessment procedures is an efficient way to assess service providers during onsite or virtual assessments or to audit your own systems.
Standardized Control Assessment (SCA) Procedure Products
The SCA Procedures provide risk professionals with a set of resources (solutions, templates, checklists, guidelines) that can be used to plan, scope, and perform third-party risk assessments. These procedures fit the “verify” portion of a third-party risk program, typically employed after an initial questionnaire such as the Standardized Information Gathering Questionnaire (SIG), to gather and confirm artifacts that attest to the veracity of the assessment.
What’s Included In the SCA?
After purchasing the SCA, you will be able download the product and supporting materials.
SCA Product
The SCA product itself.
SCA User Guide
The SCA User Guide provides a summary on how to use the SCA.
SCA Enhancement Document
This document covers the changes and revisions to the most recent version of the SCA.
“SBFE has been a member of Shared Assessments for nearly 7 years, with the SCA serving as one of the core components of our third-party risk assessment process. The SCA is a flexible and dynamic solution that allows us to validate controls and capture the full risk posture of our vendors. By integrating the SCA into our program, we have been able to stay on budget and provide sound third-party risk insight to internal leadership.”
—Peter Tannish, CISSP, CTPRP, Director, Security & Risk, SBFE, LLC
21 Risk Domains
The SCA mirrors the 21 critical risk domains from the SIG, and can be scoped to an individual organization’s needs.
- Access Control
- Application Security
- Artificial Intelligence (AI)
- Asset and Information Management
- Cloud Hosting Services
- Compliance Management
- Cybersecurity Incident Management
- Endpoint Security
- Enterprise Risk Management
- Environmental, Social, Governance (ESG)
- Human Resources Security
- Information Assurance
- IT Operations Management
- Network Security
- Nth Party Management
- Operational Resilience
- Physical and Environmental Security
- Privacy Management
- Server Security
- Supply Chain Risk Management (SCRM)
- Threat Management