Standardized Control Assessment

Assess and simplify high-risk third-party management with the trusted Standardized Control Assessment (SCA) from Shared Assessment’s TPRM Product Suite.

Pivot Point Security (PPS) offers the SCA as part of our cybersecurity suite. We hold the necessary certification to help organizations develop and operate their third-party risk management program. Many organizations outsource vendor due diligence reviews, including SCAs, to PPS for high-risk vendors. The SCA can also be used as a standardized form of third-party attestation, such as ISO 27001 or SOC 2, or as a replacement for those certifications. In these scenarios, organizations may hire a third party, such as PPS, to conduct the SCA.

Standardized Control Assessment Procedure

The SCA is a standardized set of assessment procedures used to assess high-risk service providers during onsite or virtual assessments as part of your Third Party Risk Management program. It is part of Shared Assessment’s Third-Party Risk Management (TPRM) Product Suite, which is used by over 15,000 organizations worldwide to simplify managing third party risk

How would an organization use the SCA?

There are two predominant use cases for the SCA:

  • The SCA is used to plan, scope, and perform comprehensive third-party risk/control assessments on critical vendors/partners. Think of it as the “verify” portion of a third-party risk program. Typically, your third-party risk management team, or a trusted third party (like Pivot Point Security), will execute the program.
  • It can be used as a standardized form of third-party attestation like ISO 27001 or SOC 2 . This approach is effective if key customers use the Shared Assessment Program as the basis of their vendor risk management programs, as the SCA is effectively third-party validation of the SIG questionnaire they typically send. We also have customers that use the SCA as an addendum to or a replacement for an ISO 27001/SOC 2 certification. In this scenario, they usually hire a third party to conduct the SCA.

What does an SCA include?

The SCA mirrors the 19 critical risk domains from the SIG and can be scoped to the organization being assessed.

  • Access Control
  • Application Security
  • Asset and Information Management
  • Cloud Hosting Services
  • Compliance Management
  • Cybersecurity Incident Management
  • Endpoint Security
  • Enterprise Risk Management
  • Environmental, Social, and Governance (ESG)
  • Human Resources Security
  • Information Assurance
  • IT Operations Management
  • Network Security
  • Nth Party Management
  • Operational Resilience
  • Physical and Environmental Security
  • Privacy Management
  • Server Security
  • Threat Management

What role does PPS play with the SCA?

PPS holds the necessary certification (e.g., CTPRP, CTPRA) to help organizations develop and operate their third-party risk management program. Many of our clients outsource vendor due diligence reviews, including SCAs for high-risk vendors, to PPS.

Contact Us Today

Have a question? Please fill out the form and we will reply as soon as possible.

Featured Resources

CBIZ General Light v ()

AI Tokens and How They Impact Usage Costs—Explained

Read More
CBIZ General Light v ()

What are the NIS2 and DORA EU Cyber Laws and Why Should My US-Based Business Care?

Read More
CBIZ General Green v ()

Can “War Games” Help with Cybersecurity Talent Issues

Read More
CBIZ General Light v ()

Why Traditional Business Continuity Planning is No Longer Relevant for Today’s Cloud-First SMBs

Read More
CBIZ General Light v ()

Falling Behind on CMMC Compliance? Here’s How to Catch Up Fast.

Read More
CBIZ General Green v ()

SMBs with No vCISO: Can You Answer These 5 Business-Critical Cybersecurity Questions?

Read More
CBIZ General Light v ()

What are Cloud War Games and How Can They Help Reduce Downtime Risk on AWS

Read More
CBIZ General Light v ()

What is Resilience Testing and Should We Be Doing It?

Read More
CBIZ General Green v ()

How Does the EU’s NIS2 Cybersecurity Directive Impact US-Based IT Suppliers?

Read More
CBIZ General Light v ()

How Can DORA Impact IT Suppliers in Financial Services?

Read More
CBIZ General Light v ()

Threat-led Penetration Testing: What is It and Who Needs It?

Read More
CBIZ General Green v ()

DORA and NIS2 Cyber Regulations—How Do They Compare?

Read More
Untitled design T

Episode 155: Incident Response Testing in Cloud Forward Organizations with Matt Lea

Listen Now
Untitled design T

Episode 154: How DORA Will Impact US Companies with Dejan Kosutic

Listen Now
Untitled design T

Episode 153: Inside ISO 42001: The Future of AI Governance

Listen Now
Untitled design T

Episode 152: Granular, Persistent, Zero Trust: The Case for File-Level Security

Listen Now
Trust, But Verify: How HITRUST is Reshaping Assurance

Episode 151: Trust, But Verify: How HITRUST is Reshaping Assurance

Listen Now
Episode Graphic

Episode 150: Is OSCAL the Future of Security Documentation

Listen Now
Unlocking the Future: Passkeys and Passwordless Authentication with Anna Pobletts

Episode 149: Unlocking the Future: Passkeys and Passwordless Authentication

Listen Now
Cloud Detection & Response

Episode 148: Cloud Detection & Response

Listen Now
Episode Graphic

Episode 147: Why vCISO Engagements Fail

Listen Now
Episode Graphic

Episode 146: Can Dark Web Monitoring Make You More Secure?

Listen Now
the virtual ciso podcast episode 145 with sanjeev verma

Episode 145: “CMMC: The Final Rule” With Sanjeev Verma

Listen Now
mike craig is the host of the virtual ciso podcast

Episode 144: TxRAMP or StateRAMP or AZRAMP or FedRAMP? What’s right for your company? With Mike Craig

Listen Now
overcoming ai risk

Overcoming AI Risk: Essential Strategies for
Understanding and Managing AI Challenges

Watch Now
CD PPS Webinar Updated () ()

The Evolving Threat Landscape:
Understanding Modern Cybersecurity Risk

Watch Now