Breaking News!
The IT Security Office now receives intake requests via this intake form.
- Please fill out as much as possible on the form to streamline the review of your submission. The section requesting the types of data that will be accessed/stored is especially important for us to identify necessary next steps!
- Please read below for more information about the Vendor Risk Assessment Process
ABOUT THE RISK ASSESSMENT PROCESS
University schools, departments and business units sometimes contract for data services with outside parties or service providers; of concern are those circumstances where service providers process or hold University data. While Duke University has taken steps to help ensure that its data is protected, service providers must also exercise appropriate controls to minimize the risk of exposing the data to potential unauthorized access and loss. (Note: Duke Health requires a separate review process. Initiating a DHTS Demand review is done through ServiceNow in the Service Request Catalog.)
Duke provides a Service Provider Security Assessment to:
- Establish communications and promote constructive dialogue between Duke and the potential service provider
- Help identify business, technical, security, privacy, compliance, legal, and other control factors
- Determine the level of risk inherent to the processing of data beyond the University's physical controls
A security assessment is required in all instances where:
- University data is shared with a service provider.
- A service provider captures data for subsequent use by the University.
Depending on the nature of the data, additional reviews may be required by these entities:
- Duke Privacy
- E-Commerce
- Web Accessibility
- The Service Owner for existing Duke services like Box, M365, Canvas, and others that your platform may need integration with.
Completing the assessment
REQUESTORS
The school, department, or business unit provides the service provider with the link to this page. Service providers should respond fully to the questions and return the completed assessment and the supporting documentation it requests to the Duke University requestor they are working with.
The unit contact should submit all documents to the IT Security Office via this intake form for review and scoring.
- You can preview the intake form here.
- The results of the review are provided to the requesting school or business unit, the Office of General Counsel, and Procurement Services. Please note this process can take up to two weeks.
When providing the documents to the IT Security Office (ITSO) please provide an explanation of what Duke data will be processed by the platform, and what users will have access to the platform. If external Duke users will have access, please note who they are and why they need access.
Protected data
Where the University's "Sensitive" and/or "Restricted" data is held or processed by a service provider, there is a potentially higher risk should unauthorized access or loss occur. The classification of your data will determine what additional documentation is required with your contract. For more information, see: Duke's Data Classification Standard.
Required forms
As part of the risk assessment process, vendors must submit each of the following items:
- Please complete and return the most up-to-date version of the HECVAT. To download the current version, and learn more about the tool, see: Higher Education Community Vendor Assessment Toolkit. This form must be returned as an Excel spreadsheet with all tabs intact. No other file formats will be accepted. The only earlier version that can be accepted is version 3.06 Full.
- If available, your company’s SOC 2 Type 2 report performed within the past two years, (not one for a cloud service provider such as Amazon Web Services or Microsoft Azure).
- Shibboleth Readiness Profile. Duke requires SAML 2.0 authentication to securely integrate with Duke’s Shibboleth authentication service for single sign-on. Vendors must complete this form to determine the level of effort required to integrate a vendor product with Duke’s Shibboleth environment. This is a non-negotiable requirement for any platform where Duke students will be users.
Instructions for Vendors
- Read the HECVAT Instruction Worksheet first to understand the terminology used.
- In the HECVAT, make sure that the Additional Information entry fully answers what is noted as Guidance for each question.
- The HECVAT has several questions that request additional documentation, please make sure these items are returned with your completed HECVAT and the Shibboleth Readiness Profile. Send these items to the Duke University unit contact that you are working with. They will forward your documents and a description of how the software will be used to the IT Security Office (security@duke.edu) for evaluation and scoring. The University's decision regarding which providers to select is based, in part, on the information included in your response.
Please note:
Should our discussion proceed to the point of contract negotiation, Duke university will expect you to (i) warrant that the services you provide will be in substantial conformity with the information provided in the response to the HECVAT for; (ii) inform Duke promptly of any material variation in operations from that reflected in your response; and (iii) agree that nay material deficiency in operations from those as described in your response will be deemed a material breach.
Use of third-party cloud hosting
If the Service Provider uses a third party such as Amazon Web Services or Microsoft Azure, the Service Provider will need to work with that third party to answer HECVAT questions specific to how and where Duke University data is accessed and/or stored. Answers of N/A are not appropriate for questions affected by such a hosting arrangement.