CORL Vendor Risk Management Integration

This integration is an offering provided through the Archer Exchange to enhance your existing Archer implementation. The Archer Exchange provides offerings to expand the use of Archer solutions into new business processes and address specific industry, geographic, regulatory, or technical requirements.

Cential and CORL do not provide the package and scripts openly in the marketplace and must be contacted to obtain the offering. Please email CORL Support at support@corlcustomersupport.zendesk.com for the complete installation package.

Overview

CORL provides a clearinghouse of 80,000+ vendors and their assessment data enabling reuse of vendor assessments. The integration of CORL's platform with Archer, facilitated by Cential, is a significant advancement for organizations using Archer and CORL. This integration aims to enhance third-party risk management processes by automating and streamlining risk assessments and workflows between CORL and Archer, allowing for a seamless workflow between Archer and CORL’s TPRM platform and managed services.

The primary purpose of this integration is to bridge the data and workflow between Archer and CORL's specialized third-party risk management platform and services capabilities. By establishing a seamless data exchange integrated with the Archer workflow, this integration ensures that risk assessments initiated in Archer can be completed and analyzed within CORL, with results seamlessly fed back into Archer. This closed-loop system enhances the accuracy, efficiency, and comprehensiveness of risk management activities.

Key features and benefits

With the CORL Vendor Risk Management Integration, organizations can:

  • Enable Archer users to request third-party risk assessment for a vendor be completed by CORL

  • Utilize CORL Cleared vendor information to complete risk assessment

  • Use APIs to monitor for daily risk assessment result updates

  • Pass risk assessment results back to Archer

Prerequisites (ODA and system requirements)

The following table lists the components and prerequisites for the CORL Vendor Risk Management Integration.

Components

Prerequisites

Archer Solution Area(s)

Third Party Governance

Archer Use Case(s)

Third Party Catalog

Third Party Engagement

Archer Applications

Third Party Profile

Engagements

Contacts

Uses Custom Application

No

Requires Archer On-Demand License

No

Archer requirements

Archer Platform Release 2024.06 and later

Partner/Vendor Requirements

Valid License is required for CORL

Supported Archer Environments

  • On-Premises

  • Archer SaaS

    Note: Archer SaaS clients can leverage this offering but cannot install the offering in the Archer SaaS environment. The offering must be installed on a client owned and managed server that can communicate with the Archer instance.

Compatible use cases and applications

Related applications

The following table lists the related applications for the CORL Vendor Risk Management Integration.
Application

Use Case

Primary Purposes of the Relationship

Third Party Profile

Third Party Catalog

Third Party Engagement

The Third Party Profile application is used to document all the third party relationships used by an organization. In this application, the organizational structure of the third party relationship is established, third party contacts documented, and relationship manager, risk analyst, and procurement / legal officer accountabilities are created.

Engagements

Third Party Catalog

Third Party Engagement

The Engagements application serves as the repository for all products and services provided by a third-party to the organization. Engagements are documented by type, description; and business unit; are associated with the third party delivering the engagement; the associated contracts and business processes and are assigned to an engagement owner and manager.

Contacts

IT Asset Catalog

The Contacts application serves as a central repository for contact information, enabling management to document information about the personnel involved in key organizational tasks, such as device administration and business process ownership.

Impacted use cases

Archer Use Cases

Third Party Engagement

Third Party Catalog

Impacted fields (Integrations only)

Archer Application

Archer Target Field

(Partner/Vendor Name) Source Field

Contacts

Name(First)

First Name

Contacts

Name(First)

Last Name

Contacts

Job Title

Title

Contacts

Bus. Country

Country Code

Contacts

Phone (Business Main)

Phone Number

Contacts

Phone Extension (Business Main)

Phone Extension

Contacts

Email (Business)

Email

Engagements

Assessment Category

Assessment Category

Engagements

Assessment Type

Assessment Type

Engagements

Product or Service

Is this a request for a vendor product or service?

Engagements

Medical Device

Is the product a medical device?

Engagements

Product/Service Location

At what location is this product/service being implemented?

Engagements

Engagement Name

Product or Service Name

Engagements

Model or Version Identifier

Model or Version Identifier

Engagements

Product URL

Product URL

Engagements

Description

Product or Service Description

Engagements

Engagement Owner.First Name

Business Stakeholder Contact First Name

Engagements

Engagement Owner.Last Name

Business Stakeholder Contact Last Name

Engagements

Engagement Owner.Title

Business Stakeholder Contact Department

Engagements

Engagement Owner.Phone Number

Business Stakeholder Contact Phone Number

Engagements

Engagement Owner.Email

Business Stakeholder Contact Email

Engagements

CORL Q1

Implementation Environment

Engagements

CORL Q2

Data Types

Engagements

CORL Q3

Storage Location Access Types

Engagements

CORL Q4

Network Access Type

Engagements

CORL Q5

Estimate Volume of Records

Engagements

CORL Q6

Business Impact

Engagements

CORL Q7

Vendor Inherent Risk Rating

Engagements

CORL Q8

Obtain Scoping Information

Engagements

CORL Q9

Obtain Control Information

Engagements

Assessment Comments

Assessment Comments

Engagements

Engagement ID

Assessment ID

Engagements

Engagement Name

Assessment Name

Engagements

CORL Stage

Stage

Engagements

CORL Status

Status

Engagements

Risk Rating Score

Risk Rating Score

Engagements

Risk Rating Summary

Risk Rating Summary

Engagements

Risk Rating Recommended Action

Risk Rating Recommended Action

Engagements

Impact Level

Impact Level

Engagements

Impact Level Category

Impact Level Category

Third Party Profile

Third Party Name

Vendor Name

Third Party Profile

Website

Vendor URL

Third Party Profile

CORL Vendor ID

Vendor Correlation ID

Third Party Profile

Third Party ID

Vendor ID

Third Party Profile

Country

Vendor Headquarters Country

Third Party Profile

State

Vendor Headquarters State

Third Party Profile Third Party Contact Information Vendor Contact

Additional Resources

The following additional resources are available for this offering:

Components

Architecture diagram

The following diagram shows the relationships between the applications that make up the CORL Vendor Risk Management Integration.

Process diagram

Third Party Risk Management Users can create a CORL Assessment by completing the following steps:

  1. Create a new Engagement record in Archer

  2. Check the CORL Assessment checkbox field

  3. Locate and complete the fields contained within the CORL Inherent Risk Assessment tab. Note: There are fields that are read only and are editable only by the integration

  4. Once the integration is scheduled to run, the assessment request will carry over to the CORL application

  5. As updates become available, the integration will pull the updates from CORL and import them into Archer. Fields updated are found under the CORL Assessment Status and CORL Risk Summary sections of the CORL Information Security Risk tab.

Note: There are not any workflow dependencies configured to wait for CORL results. Engagements advanced workflow will function as it does out of box.

The following diagram shows the general workflow of the application:

Applications

The CORL Vendor Risk Management Integration does not require any On-Demand Applications.

Personas and Access Roles

The following table describes the functions that make up the application’s organization roles. Depending on the organization of your company, these functions and responsibilities may vary.

All access roles provided by the Third Party Use Cases are preserved. The only additional role provided is the “CORL API Integration” role, which serves to enable service account access to all engagement and third party profile records.

Function Description
CORL API Integration Provides read and update access to Engagements and Third Party profiles.
Archer User Third Party Use Case user with create and update access to the Engagements application.

Installing CORL Vendor Risk Management Integration

Security Considerations

The information in this publication is provided "as is". Archer makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Client is solely responsible for ensuring that the installation of the application is performed in a secure manner. Archer recommends clients perform a full security evaluation prior to implementation.

Installation Overview

Complete the following tasks to install the offering.

Installing the package

Configuring the CORL Vendor Risk Management Integration

Configuring the Integration Script

Upgrading CORL Vendor Risk Management Integration

This chapter has been intentionally left blank and will be completed as updates have been made to this offering

Using CORL Vendor Risk Management Integration

Certification environment

Date Tested: August 2024

Product Name

Release Information

Operating System

Archer Suite

2024.06

Virtual Appliance

CORL

-

Virtual Appliance