The most sophisticated attack surface in your organization isn't your code — it's your vendors. SolarWinds, Log4j, the Okta breach — some of the largest security incidents of the past decade were supply chain attacks that exploited trusted third-party relationships.
Every SaaS tool you use, every API you integrate, every contractor you give system access to is a potential vector. A vendor security assessment program isn't bureaucracy — it's a fundamental risk management requirement for any company with compliance obligations.
Why Vendor Risk Matters for Compliance
SOC 2 — The CC9 (Common Criteria 9) category specifically requires vendor management controls. Auditors will ask for your vendor inventory and evidence that you assess vendor security. HIPAA — Every Business Associate must have a signed BAA. Covered entities are liable for breaches caused by unvetted Business Associates. ISO 27001 — Clause 8.1 and Annex A control A-5.19 through A-5.23 address supplier relationships and third-party risk management. PCI DSS — Requirement 12.8 mandates policies and procedures for managing service providers.This means vendor security assessments aren't optional for any seriously compliant organization.
Building Your Vendor Inventory
You can't assess what you haven't inventoried. Start here.
Step 1: Discover all vendorsPull records from:
- Accounts payable / expense reports (anything paid is a vendor)
- Your SSO/identity provider (anything your team logs into)
- Your network proxy or DNS logs (anything accessed from your systems)
- Contract management system
- Your engineering team (shadow IT is real)
- Vendor name and website
- Primary contact
- Service provided
- Data shared (what data types, including personal data)
- System access level (read/write, production/non-production)
- Contractual relationship (contract term, renewal date)
Not all vendors deserve the same scrutiny. Tier them:
Tier 1 (Critical): Vendors with access to production systems, sensitive data, or that could cause significant business disruption if compromised. Examples: cloud infrastructure providers, payment processors, identity providers, security tools. Tier 2 (High): Vendors with access to non-production sensitive data or indirect access to systems. Examples: CRM, support ticketing, HR platforms. Tier 3 (Standard): Vendors with no access to sensitive data. Examples: project management tools, team communication, analytics.Assessing Tier 1 Vendors
Tier 1 vendors require the most thorough assessment. This typically involves:
Reviewing Security Documentation
Request and review:
- SOC 2 Type 2 report — The gold standard. Review for scope, exceptions, and whether their controls cover the services you use.
- ISO 27001 certificate — Confirms an ISMS is in place and audited.
- Penetration test results — Recent results (within 12 months) and evidence of remediation.
- Security whitepaper — Describes their security architecture, encryption practices, and controls.
- Privacy policy — Especially important for vendors handling personal data.
- Incident response process — How will they notify you of a breach? What's their SLA?
Security Questionnaire
For vendors without SOC 2 or ISO 27001, send a security questionnaire. Industry-standard options:
- CAIQ (Consensus Assessments Initiative Questionnaire) from Cloud Security Alliance — Comprehensive, cloud-focused
- SIG (Standardized Information Gathering) from Shared Assessments — Widely used, thorough
- VSAQ (Vendor Security Assessment Questionnaire) from Google — Open-source, practical
- Data security and encryption
- Access control and authentication
- Incident response and breach notification
- Business continuity and disaster recovery
- Subprocessors and fourth-party risk
- Regulatory compliance (SOC 2, ISO 27001, GDPR, etc.)
Contract Requirements
Before signing, ensure your contract includes:
- Data Processing Agreement (DPA) for personal data processing (required under GDPR, CCPA, HIPAA BAA)
- Security requirements and standards the vendor must maintain
- Right to audit or receive audit reports
- Breach notification timeline (shorter is better — 72 hours or less)
- Data return and deletion on contract termination
- Subprocessor restrictions
- Liability and indemnification for security incidents
Assessing Tier 2 Vendors
Tier 2 assessments are lighter:
- Request SOC 2 summary or security page
- Review privacy policy and DPA
- Complete a shortened security questionnaire (10-20 questions)
- Sign DPA/BAA if applicable
- Document the assessment
Tier 3 Vendors
Minimal assessment:
- Confirm no sensitive data is shared
- Ensure vendor is reputable (not obscure, recently founded, or under sanctions)
- Document in your vendor register
Ongoing Vendor Monitoring
A point-in-time assessment is not enough. Vendors change. Their security postures evolve — sometimes for the worse. Ongoing monitoring includes:
Annual re-assessment — Review updated SOC 2 reports, questionnaires, and any security incidents that occurred during the year. Breach monitoring — Sign up for HaveIBeenPwned alerts for your vendors' domains. Monitor threat intelligence feeds for vendor-specific breach news. Questionnaire refresh — Send updated questionnaires annually to Tier 1 vendors or after significant vendor changes. Subprocessor monitoring — Many vendors add subprocessors without proactive notification. Check their subprocessor lists periodically. Contract renewal reviews — Use renewal as an opportunity to update security requirements.Red Flags in Vendor Assessments
Automatically escalate to security leadership if a vendor:
- Cannot provide any security documentation
- Has a SOC 2 report with significant exceptions
- Has experienced a major breach in the past 24 months without visible remediation
- Refuses to sign a DPA for personal data processing
- Cannot answer basic questions about their security program
- Is reluctant to notify customers of security incidents
Documenting Your Program
For compliance purposes, maintain:
- Your vendor inventory (updated quarterly)
- Assessment records for each vendor (with date, assessor, and findings)
- Contracts and DPAs
- Questionnaire responses
- SOC 2/ISO 27001 reports received
- Remediation records for vendor findings
Building a Culture of Vendor Security
The best vendor security programs aren't just a spreadsheet reviewed once a year — they're embedded in business processes:
- Procurement gate: No new vendor relationship approved without security review
- Engineering gate: No new third-party library/API integrated without security sign-off
- Finance gate: No new recurring payment without vendor inventory update