Supply Chain Security2021-09-02T13:12:27+00:00

Vendor and Supply Chain

Compliance Software

Rizkly is effective and efficient solution for securing your supply chain.  Whether it’s 10 or 10,000 vendors, Rizkly lets you implement a vendor risk management and compliance program within weeks to ensure that your vendors secure their environment according to your requirements.  Rizkly’s lets you benchmark vendors and expedite assessment and scoring activities.  You can take if further by assigning specific security and operational controls to one or more vendors and streamline the ongoing tracking and management of their status.  Rizkly eases the goal of helping suppliers safeguard critical information and lets you gain confidence that actions are underway to achieve better security and compliance.

Rizkly’s ability to assist small and midsize enterprises means your suppliers will not be overwhelmed.  Rizkly includes the guidance, templates, task assignment and tracking into one solution to make it the right choice for enabling your supply chain to comply with your requirements.   Rizkly expert advisors will help your vendors come up to speed on best practices, practical remediation methods and tailoring included policy/procedure templates to ensure effective security controls.   Role based access controls means your supply chain compliance initiative can involve many different vendors, advisors and assessors…each with specific permissions and views of information.

What’s Included

  • Supports all supply chain and vendor compliance frameworks (NIST, ISO, NERC CIP-013-1. CMMC, etc.) or create your own

  • Assessment and surveys to quickly identify boundaries and sensitive information

  • Secure cloud app for managing continuous compliance, evidence capture, policies and procedures

  • Dashboards and alerts to ensure completion and tracking of required NIST 800-171 controls

  • Automatic System Security Plan (SSP) and Plan of Action & Milestones (POA&M) Generation

  • Ongoing Advisory, Coaching, PMO and Quarterly CISO Reviews

  • Scoring and SPRS submission report to ease compliance with the CMMC Interim Rule (DFARS Case 2019-D041)

  • One-click migration with auto control population when if you transition to any level of CMMC

Need More Information?

    Benefits

    • Supply Chain/Vendor Compliance Program Management: Manage and entire supply chain compliance program in one place.  Streamline collaboration between you and your vendors and easily track status and risks.

    • Tasking and Tracking: Assign ownership and access compliance status with a few clicks. Users receive alerts when it’s time to review controls or attach evidence

    • Compliance Audit Documentation: One-click creation of audit-ready documentation such as System Security Plans (SSP), DFARS control scoring and Incident Response Plans  (IRP) reduces the time and effort needed to create, review, and maintain compliance documents, letting you focus on implementing security, rather than documenting it

    • Role-Based Access: streamline the compliance collaboration with your suppliers while providing them with an effective and efficient solution to achieve your compliance requirements.  Learn more about all of the features that make Rizkly the perfect vendor supply chain solution here.


    Rizkly”800-171 Compliant” badge for our customers

    Rizkly Compliance eBook and Datasheet 

    Questions about supply chain compliance and

    how to quickly roll out a program?  

    We will pick up the phone and give you a call to discuss your needs. 

    Schedule a Supply Chain Compliance Demo
    Do you perform system remediation work?2022-05-19T02:00:44+00:00

    Rizkly experts will advise, guide and review hardware and software technology changes to ensure that they address specific compliance controls but we do not perform the actual implementation work.  Over the years, we have a developed a trusted ecosystem of partners who offer effective and affordable solutions to expedite remediation of security and compliance gaps.  We will gladly refer you to appropriate partners if and when the need arises.   Creating policies,  procedures and other artifacts are also a key part of compliance remediation efforts and these are activities that our advisors do perform using powerful Rizkly features for policies and procedures.

    A description of the services that Rizkly expert advisors provide?2022-05-19T01:37:42+00:00

    Rizkly cybersecurity compliance advisors will work with you through the entire lifecycle of your compliance initiative.  We will scale up/down depending on specific need, and we co-create our involvement in the early stages of the project.  Typical project activities include:

    • Gain an understanding of your business, your clients, your system(s), and your anticipated compliance requirements
    • Educate your team members on compliance requirements, how to leverage the Rizkly app and what will be expected throughout the effort 
    • Develop the system ‘boundary’, and what will be in scope for compliance purposes
    • Draft a system architecture diagram that clearly depicts the system boundary
    • Review existing documentation and work with your team members to understand system and process specifics
    • Perform a high level gap assessment to determine what controls are in place and operating effectively, and where there are gaps
    • For each gap determine a detailed plan of action to remediate
    • Collaborate as needed with personnel (staff and/or your vendors) during remediation. 
    • Provide advisory support, develop documentation, design controls, review evidence, audit prep, etc.
    • Ensure that all artifacts and control implementation statements are effectively captured in Rizkly
    • Educate your team on how to leverage Rizkly to generate audit-ready documentation such as SSPs, POAM reports and SPRS scoring
    • Post-remediation ensure that all controls are in place and operating effectively

    Title

    Go to Top