Vendor RiskThird PartySecurity AssessmentSupply Chain

Vendor Security Assessment Guide: How to Evaluate Third-Party Risk

Third-party vendors are one of the largest sources of security risk for modern businesses. This guide shows you how to build a vendor security assessment program that actually protects you, without creating bureaucratic overhead.

O
OuterSec Team
··8 min read

The most sophisticated attack surface in your organization isn't your code — it's your vendors. SolarWinds, Log4j, the Okta breach — some of the largest security incidents of the past decade were supply chain attacks that exploited trusted third-party relationships.

Every SaaS tool you use, every API you integrate, every contractor you give system access to is a potential vector. A vendor security assessment program isn't bureaucracy — it's a fundamental risk management requirement for any company with compliance obligations.

Why Vendor Risk Matters for Compliance

SOC 2 — The CC9 (Common Criteria 9) category specifically requires vendor management controls. Auditors will ask for your vendor inventory and evidence that you assess vendor security. HIPAA — Every Business Associate must have a signed BAA. Covered entities are liable for breaches caused by unvetted Business Associates. ISO 27001 — Clause 8.1 and Annex A control A-5.19 through A-5.23 address supplier relationships and third-party risk management. PCI DSS — Requirement 12.8 mandates policies and procedures for managing service providers.

This means vendor security assessments aren't optional for any seriously compliant organization.

Building Your Vendor Inventory

You can't assess what you haven't inventoried. Start here.

Step 1: Discover all vendors

Pull records from:

  • Accounts payable / expense reports (anything paid is a vendor)
  • Your SSO/identity provider (anything your team logs into)
  • Your network proxy or DNS logs (anything accessed from your systems)
  • Contract management system
  • Your engineering team (shadow IT is real)
For each vendor, capture:
  • Vendor name and website
  • Primary contact
  • Service provided
  • Data shared (what data types, including personal data)
  • System access level (read/write, production/non-production)
  • Contractual relationship (contract term, renewal date)
Step 2: Categorize by risk tier

Not all vendors deserve the same scrutiny. Tier them:

Tier 1 (Critical): Vendors with access to production systems, sensitive data, or that could cause significant business disruption if compromised. Examples: cloud infrastructure providers, payment processors, identity providers, security tools. Tier 2 (High): Vendors with access to non-production sensitive data or indirect access to systems. Examples: CRM, support ticketing, HR platforms. Tier 3 (Standard): Vendors with no access to sensitive data. Examples: project management tools, team communication, analytics.

Assessing Tier 1 Vendors

Tier 1 vendors require the most thorough assessment. This typically involves:

Reviewing Security Documentation

Request and review:

  • SOC 2 Type 2 report — The gold standard. Review for scope, exceptions, and whether their controls cover the services you use.
  • ISO 27001 certificate — Confirms an ISMS is in place and audited.
  • Penetration test results — Recent results (within 12 months) and evidence of remediation.
  • Security whitepaper — Describes their security architecture, encryption practices, and controls.
  • Privacy policy — Especially important for vendors handling personal data.
  • Incident response process — How will they notify you of a breach? What's their SLA?
If a vendor can't provide any of these, that's a significant risk signal.

Security Questionnaire

For vendors without SOC 2 or ISO 27001, send a security questionnaire. Industry-standard options:

  • CAIQ (Consensus Assessments Initiative Questionnaire) from Cloud Security Alliance — Comprehensive, cloud-focused
  • SIG (Standardized Information Gathering) from Shared Assessments — Widely used, thorough
  • VSAQ (Vendor Security Assessment Questionnaire) from Google — Open-source, practical
Key areas to cover:
  • Data security and encryption
  • Access control and authentication
  • Incident response and breach notification
  • Business continuity and disaster recovery
  • Subprocessors and fourth-party risk
  • Regulatory compliance (SOC 2, ISO 27001, GDPR, etc.)

Contract Requirements

Before signing, ensure your contract includes:

  • Data Processing Agreement (DPA) for personal data processing (required under GDPR, CCPA, HIPAA BAA)
  • Security requirements and standards the vendor must maintain
  • Right to audit or receive audit reports
  • Breach notification timeline (shorter is better — 72 hours or less)
  • Data return and deletion on contract termination
  • Subprocessor restrictions
  • Liability and indemnification for security incidents

Assessing Tier 2 Vendors

Tier 2 assessments are lighter:

  • Request SOC 2 summary or security page
  • Review privacy policy and DPA
  • Complete a shortened security questionnaire (10-20 questions)
  • Sign DPA/BAA if applicable
  • Document the assessment
Annual review is typically sufficient.

Tier 3 Vendors

Minimal assessment:

  • Confirm no sensitive data is shared
  • Ensure vendor is reputable (not obscure, recently founded, or under sanctions)
  • Document in your vendor register

Ongoing Vendor Monitoring

A point-in-time assessment is not enough. Vendors change. Their security postures evolve — sometimes for the worse. Ongoing monitoring includes:

Annual re-assessment — Review updated SOC 2 reports, questionnaires, and any security incidents that occurred during the year. Breach monitoring — Sign up for HaveIBeenPwned alerts for your vendors' domains. Monitor threat intelligence feeds for vendor-specific breach news. Questionnaire refresh — Send updated questionnaires annually to Tier 1 vendors or after significant vendor changes. Subprocessor monitoring — Many vendors add subprocessors without proactive notification. Check their subprocessor lists periodically. Contract renewal reviews — Use renewal as an opportunity to update security requirements.

Red Flags in Vendor Assessments

Automatically escalate to security leadership if a vendor:

  • Cannot provide any security documentation
  • Has a SOC 2 report with significant exceptions
  • Has experienced a major breach in the past 24 months without visible remediation
  • Refuses to sign a DPA for personal data processing
  • Cannot answer basic questions about their security program
  • Is reluctant to notify customers of security incidents

Documenting Your Program

For compliance purposes, maintain:

  • Your vendor inventory (updated quarterly)
  • Assessment records for each vendor (with date, assessor, and findings)
  • Contracts and DPAs
  • Questionnaire responses
  • SOC 2/ISO 27001 reports received
  • Remediation records for vendor findings
OuterSec includes vendor risk tracking as part of your compliance dashboard. Track your vendor inventory, assessment status, and risk levels alongside your technical compliance checks — so everything is in one place when your auditor asks.

Building a Culture of Vendor Security

The best vendor security programs aren't just a spreadsheet reviewed once a year — they're embedded in business processes:

  • Procurement gate: No new vendor relationship approved without security review
  • Engineering gate: No new third-party library/API integrated without security sign-off
  • Finance gate: No new recurring payment without vendor inventory update
When vendor security review becomes a normal part of doing business — not an afterthought — your supply chain risk drops dramatically. And your auditors will notice.

Stop monitoring compliance manually

OuterSec automates continuous compliance monitoring across SOC 2, HIPAA, ISO 27001, and PCI-DSS. Get alerted the moment something drifts.