ChecklistGuro logo ChecklistGuro Solutions Industries Company Pricing

Supply Chain Security Risk Checklist

Proactively safeguard your supply chain! This Supply Chain Security Risk Checklist helps you identify, assess, and mitigate vulnerabilities - from supplier selection to final delivery. Ensure business continuity and protect your assets with this essential security audit tool.

This Template was installed 3 times.

Physical Security Assessments

1 of 10

Evaluates physical access controls and security measures at key facilities.

Warehouse/Facility Location

Perimeter Security (Fencing, Walls)

Number of Security Cameras

Last Perimeter Security Inspection Date

Description of Access Control System (Card Readers, Biometrics)

Visitor Management Protocol

Site Security Layout Diagram

Cybersecurity Risk Management

2 of 10

Assesses cybersecurity posture across the supply chain, including data protection and system vulnerability.

Last Penetration Test Score

Current Security Framework (e.g., NIST, ISO 27001)

Summary of Recent Cybersecurity Incidents

Security Controls Implemented (Select all that apply)

Date of Last Security Awareness Training

Upload Latest Vulnerability Scan Report

Supplier Risk Profiling

3 of 10

Identifies and prioritizes suppliers based on security risk factors and geographic location.

Supplier Risk Score (1-10)

Geographic Region of Supplier

Criticality to Supply Chain

Supplier's Security Certification(s) (e.g., ISO 27001, SOC 2)

Last Risk Assessment Date

Supplier Tier (e.g., Tier 1, Tier 1.5, Tier 2)

Supplier Security Questionnaire

Contractual Security Requirements

4 of 10

Reviews supplier contracts to ensure adequate security clauses and liability provisions are in place.

Security Breach Notification Timeline Defined?

Penalties for Security Breaches (Value)

Description of Security Audit Rights Granted to Company

Data Encryption Requirements Specified?

Attach Contractual Security Addendum (if applicable)

Last Contract Review Date

Specific Security Standards Referenced in Contract (e.g., ISO 27001, SOC 2)

Transportation Security

5 of 10

Evaluates security measures during transportation of goods, including tracking, route optimization, and theft prevention.

Mode of Transportation

Average Shipment Value (USD)

Security Measures Implemented (Select All That Apply)

Primary Transportation Hub Location

Last Security Audit Date

Transportation Security Plan Document

Carrier Security Rating

Incident Response Planning

6 of 10

Examines the preparedness for security incidents, including detection, containment, and recovery procedures.

Describe the incident response team composition and roles.

Estimated time to activate the Incident Response Plan (in minutes).

Primary communication method for incident notification (e.g., Email, Phone, SMS)

Date of last Incident Response Plan test/simulation

Outline steps for identifying and classifying security incidents.

Potential incident types covered by this plan (Select all that apply)

Describe the process for containing and eradicating incidents.

Target Recovery Time Objective (RTO) - In hours.

Business Continuity & Disaster Recovery

7 of 10

Reviews plans to maintain operations during disruptions, including alternate sourcing and facility backups.

Estimated Downtime Tolerance (Hours)

Last Disaster Recovery Test Date

Summary of Recovery Procedures

Critical Systems Covered by DR Plan

Backup Location Type

DR Plan Documentation

Next DR Plan Review Date

Compliance & Regulatory Checks

8 of 10

Verifies adherence to relevant security regulations and industry standards.

Relevant Regulations (e.g., GDPR, C-TPAT)

Last Compliance Audit Date

Audit Score (if applicable)

Summary of Findings from Last Compliance Audit

Third-Party Certification Status

Compliance Documentation (e.g., Certificates, Audit Reports)

Data Security & Privacy

9 of 10

Assesses controls for protecting sensitive data shared with and by suppliers.

Data Encryption at Rest?

Data Encryption in Transit?

Number of Data Breaches in Past Year?

Details of Data Breaches (if any)

Data Privacy Frameworks Adhered To?

If 'Other' selected for Data Privacy Frameworks, please specify.

Data Retention Policy in Place?

Last Data Privacy Impact Assessment Date

Employee Security Awareness

10 of 10

Evaluates training and awareness programs for employees and suppliers regarding security risks and best practices.

Have you received security awareness training in the last 12 months?

Which security topics have you been trained on?

How confident are you in identifying a phishing email (1-10, 10 being very confident)?

Describe a recent security incident you were involved in (if any).

Are you aware of the company's reporting procedures for security incidents?

Date of last security awareness training completion.

We can do it Together

Need help with Checklists?

Have a question? We're here to help. Please submit your inquiry, and we'll respond promptly.

Email Address
How can we help?