Back to Resources
TemplateInteractive Assessment

Vendor Security Assessment Template

Comprehensive questionnaire for evaluating third-party vendor security. Third-party involvement in breaches has doubled from 15% to 30%.

30%
Of breaches involve third parties (up from 15%)
54%
Of organizations had a third-party breach in 2024
$4.5M
Average cost of third-party breach
12
Average weeks to identify third-party breach
Assessment Progress
0 / 23

How to Use This Assessment

  1. 1.Send this questionnaire to your vendor or use it during vendor evaluation calls
  2. 2.Mark responses as Yes (fully compliant), Partial (partially implemented), or No
  3. 3.Pay special attention to High-risk items; these should be deal-breakers if "No"
  4. 4.Request evidence/documentation for affirmative responses

Security Certifications

High Risk

Does the vendor have SOC 2 Type II certification?

Request a copy of their most recent SOC 2 report. Verify the audit period covers current operations.

Medium Risk

Does the vendor have ISO 27001 certification?

ISO 27001 demonstrates formal information security management. Request certificate and scope.

High Risk

Are industry-specific certifications present (HIPAA, PCI-DSS, GDPR)?

Required if vendor handles healthcare, payment card, or EU resident data.

Access Controls

High Risk

Does the vendor enforce multi-factor authentication for all access?

MFA should be mandatory for all users, especially those accessing your data.

High Risk

Does the vendor use role-based access control (RBAC)?

Verify least privilege principles are enforced.

Medium Risk

Can the vendor provide access logs upon request?

Important for incident investigation and compliance audits.

High Risk

Does the vendor have privileged access management (PAM)?

Admin access should be controlled, monitored, and time-limited.

Data Protection

High Risk

Is data encrypted at rest using AES-256 or equivalent?

Verify encryption standards and key management practices.

High Risk

Is data encrypted in transit using TLS 1.2 or higher?

TLS 1.0 and 1.1 are deprecated and should not be accepted.

Medium Risk

Does the vendor have a data classification policy?

Ensures sensitive data receives appropriate protection.

Medium Risk

Can the vendor demonstrate data residency compliance?

Important for regulatory compliance (GDPR, data sovereignty).

Incident Response

High Risk

Does the vendor have a documented incident response plan?

Request a copy or summary of their IR procedures.

High Risk

What is the vendor's breach notification timeline?

Should align with your regulatory requirements (e.g., 72 hours for GDPR).

Medium Risk

Does the vendor conduct regular incident response testing?

Tabletop exercises should be conducted at least annually.

Business Continuity

High Risk

Does the vendor have a business continuity plan?

Request RTO/RPO commitments and disaster recovery procedures.

High Risk

Does the vendor test backup and recovery procedures regularly?

Annual testing minimum; request evidence of recent tests.

Medium Risk

What is the vendor's historical uptime percentage?

Request SLA commitments and historical performance data.

Subcontractors & Fourth Parties

High Risk

Does the vendor assess security of their subcontractors?

Supply chain attacks are increasing; fourth-party risk is real.

Medium Risk

Can the vendor provide a list of critical subcontractors?

Know who has access to your data beyond the primary vendor.

Medium Risk

Does the contract allow subcontractor audits?

Ensure you have visibility into the full supply chain.

Vulnerability Management

High Risk

Does the vendor conduct regular vulnerability scans?

Should be at least monthly for internet-facing systems.

High Risk

Does the vendor have a penetration testing program?

Annual third-party pen tests are industry standard.

High Risk

What is the vendor's patch management timeline?

Critical patches should be applied within 24-48 hours.

Contract Security Requirements

Beyond the assessment, ensure your vendor contracts include these security provisions:

Must-Have Clauses

  • Breach notification within 24-72 hours
  • Right to audit security controls annually
  • Data return/deletion upon contract termination
  • Subcontractor security requirements
  • Cyber insurance requirements

Liability Considerations

  • Uncapped liability for data breaches
  • Indemnification for third-party claims
  • Service level agreements with penalties
  • Business continuity commitments

Need Help Managing Vendor Risk?

Our team can help you build a vendor risk management program that protects your organization from third-party breaches.