Vendor Risk Management: The Complete Guide to Third-Party Risk Programs
A comprehensive guide to building and operating a vendor risk management program, covering due diligence, risk tiering, onboarding assessments, ongoing monitoring, offboarding, and fourth-party risk in the wake of supply-chain attacks.
Every organization depends on vendors. The average enterprise now relies on hundreds — sometimes thousands — of third-party providers for everything from cloud infrastructure to payroll processing. Each of those relationships introduces risk: a vendor's data breach becomes your data breach, a vendor's downtime becomes your downtime, and a vendor's compliance failure can become your regulatory problem. Vendor risk management is the discipline that turns this sprawling web of dependencies into something you can actually govern, and in our experience helping clients build these programs from scratch, it is one of the highest-leverage investments a security team can make.
The regulatory and commercial pressure behind vendor risk management has intensified dramatically over the past five years. SOC 2 Trust Services Criteria require organizations to evaluate the risks associated with vendors and business partners. ISO 27001 Annex A Control 5.19 mandates information security in supplier relationships. HIPAA requires covered entities to execute Business Associate Agreements with vendors that handle protected health information. And beyond regulatory requirements, enterprise buyers now routinely ask about your vendor risk program during their own security evaluations — creating a recursive chain of accountability that stretches across the entire supply chain.
This guide covers the complete vendor risk lifecycle: due diligence, risk tiering, onboarding assessment, ongoing monitoring, and offboarding. We also cover fourth-party risk, assessment instruments, and the practical realities of operationalizing a vendor risk program at scale.
Why Vendor Risk Management Matters More Than Ever
The Expanding Attack Surface
The shift to cloud-native architectures and SaaS-based tooling has fundamentally changed the vendor risk equation. A decade ago, most vendors operated at arm's length — they might supply hardware or provide occasional consulting services, but they rarely had persistent access to your data or systems. Today, the average SaaS application has direct API integrations with your identity provider, your cloud infrastructure, and your data stores.
What this means in practice is that your security perimeter now extends through every vendor with access to your environment. A compromised vendor credential is functionally equivalent to a compromised employee credential, except that you have far less visibility into the vendor's internal security practices.
Supply-Chain Attacks as an Inflection Point
The SolarWinds attack in 2020 was a watershed moment for vendor risk management. A sophisticated threat actor compromised the build system of a widely-used IT monitoring platform, inserting malicious code into software updates that were distributed to approximately 18,000 organizations — including multiple U.S. government agencies and Fortune 500 companies. The victims did not have a direct relationship with the attacker. They trusted SolarWinds, and SolarWinds' build pipeline was compromised.
Since then, the pattern has repeated: Kaseya in 2021, Okta in 2022, MOVEit in 2023, and numerous others. Each incident reinforced the same lesson: your security is only as strong as the weakest link in your vendor chain.
Regulatory and Commercial Drivers
| Driver | Requirement | Impact |
|---|---|---|
| SOC 2 (CC9.2) | Assess and manage risks from vendors and business partners | Required for Type II reports |
| ISO 27001 (A.5.19-5.22) | Information security in supplier relationships | Required for certification |
| HIPAA | Business Associate Agreements for PHI handlers | Required for covered entities |
| PCI DSS (Req. 12.8) | Maintain policies for managing service providers | Required for merchants and processors |
| GDPR (Art. 28) | Data processing agreements with processors | Required for EU data processing |
| NIST 800-171 (3.16) | System and communications protection for CUI | Required for defense contractors |
| Enterprise buyers | Vendor risk questionnaires during procurement | Required to close deals |
In our experience, the commercial driver is often the most compelling for growing companies. When a prospect asks about your vendor risk program and you cannot demonstrate a structured approach, the deal stalls. When you can point to a documented program with risk tiering, assessment records, and monitoring processes, you build the trust that accelerates enterprise sales.
The Vendor Risk Lifecycle
A mature vendor risk management program follows a structured lifecycle with five phases. Each phase has specific activities, responsible parties, and artifacts.
Phase 1: Due Diligence and Intake
Before onboarding any new vendor, you need a process for initial evaluation. This is not the full risk assessment — it is the triage step that determines whether the vendor should proceed to formal evaluation and what level of scrutiny is appropriate.
Key activities during due diligence:
- Business need validation. Confirm that the vendor solves a legitimate business problem and that no existing vendor or internal capability can address the need. Redundant vendors increase risk surface without proportional benefit.
- Preliminary security review. Check for baseline indicators: Does the vendor hold a SOC 2 Type II report? ISO 27001 certification? Do they publish a trust center? Are they listed on the CSA STAR registry?
- Data classification. Determine what data the vendor will access, process, or store. This is the single most important input to risk tiering.
- Regulatory screening. Identify any regulatory requirements triggered by the vendor relationship — BAAs for healthcare data, DPAs for EU personal data, ITAR restrictions for defense-related information.
What we tell clients is to build a standardized intake form that captures this information consistently. A one-page form that asks about data access, system integration, business criticality, and regulatory exposure gives you everything you need to make a tiering decision.
Phase 2: Risk Tiering
Risk tiering is the foundation of an efficient vendor risk program. Without it, you either over-assess low-risk vendors (wasting resources) or under-assess critical vendors (creating blind spots). The goal is to match assessment rigor to actual risk.
A practical three-tier model:
| Tier | Criteria | Examples | Assessment Level |
|---|---|---|---|
| Tier 1 (Critical) | Processes sensitive data, has network access, business-critical service, regulatory implications | Cloud infrastructure, identity provider, payment processor, EHR system | Full SIG questionnaire, SOC 2 report review, penetration test results, on-site or virtual assessment, annual reassessment |
| Tier 2 (Significant) | Some data access, moderate business impact, limited system integration | HR platform, CRM, marketing automation, analytics tools | SIG Lite or CAIQ, SOC 2 report review, annual or biannual reassessment |
| Tier 3 (Low) | No sensitive data access, minimal business impact, easily replaceable | Office supplies, general consulting, non-integrated SaaS tools | Self-attestation questionnaire, periodic review on contract renewal |
The tiering decision should be documented and approved by the risk owner — typically the business unit that sponsors the vendor relationship. In our experience, the most common mistake is failing to re-tier vendors when their scope changes. A marketing tool that starts as Tier 3 can quickly become Tier 2 if the team enables a customer data integration.
Phase 3: Onboarding Assessment
Once a vendor is tiered, the assessment process begins. The depth and instrument depend on the tier assignment.
Assessment instruments by tier:
For Tier 1 vendors, we recommend the full SIG questionnaire, which covers 18 risk domains across 800+ questions. This provides the most comprehensive view of a vendor's security and risk posture. Supplement the SIG with a review of the vendor's SOC 2 Type II report, paying particular attention to any qualified opinions, exceptions, or complementary user entity controls (CUECs).
For Tier 2 vendors, SIG Lite or the CAIQ provide appropriate depth without the resource burden of a full SIG. SIG Lite covers the same 18 domains at a higher level with roughly 200 questions. CAIQ is particularly appropriate for cloud and SaaS vendors, as it aligns with the Cloud Controls Matrix.
For Tier 3 vendors, a self-attestation questionnaire of 20 to 40 questions covering the essentials — encryption, access controls, incident response, business continuity — is typically sufficient.
What to look for in assessment responses:
- Non-answers and deflections. Responses like "we follow industry best practices" without specifics are a red flag. Press for concrete details.
- Missing controls. The absence of MFA, encryption at rest, or a documented incident response plan should trigger escalation regardless of vendor tier.
- Subprocessor transparency. Ask vendors to disclose their critical subprocessors. If a vendor cannot tell you who handles their data, that is a significant risk indicator.
- Contractual alignment. Ensure that the vendor's stated practices align with what they are willing to commit to contractually. Verbal assurances without contractual backing are insufficient.
Phase 4: Ongoing Monitoring
Assessment at onboarding is necessary but not sufficient. Vendor risk is not static — security postures change, new vulnerabilities emerge, and vendors modify their infrastructure and practices over time. Ongoing monitoring bridges the gap between periodic assessments.
Continuous monitoring data sources:
- Security ratings platforms. Services like SecurityScorecard, BitSight, and RiskRecon provide outside-in assessments of vendor security posture based on observable indicators — exposed services, certificate hygiene, patching cadence, email security configuration. These ratings are imperfect but valuable as early warning indicators.
- Breach notification feeds. Monitor for vendor appearances in breach databases, regulatory enforcement actions, and security incident disclosures.
- SOC 2 report renewals. Track the expiration dates of vendor SOC 2 reports and request updated reports upon renewal. Pay attention to changes in exceptions or qualified opinions between reporting periods.
- Contract compliance tracking. Monitor whether vendors are meeting their contractual security obligations — providing required notifications, maintaining certifications, and complying with data handling requirements.
- Dark web monitoring. For critical Tier 1 vendors, monitoring for leaked credentials or data on dark web marketplaces can provide early warning of a compromise.
What we recommend to clients is establishing a monitoring cadence that aligns with vendor tiers:
| Activity | Tier 1 | Tier 2 | Tier 3 |
|---|---|---|---|
| Security rating review | Monthly | Quarterly | Annually |
| Full reassessment | Annually | Every 18 months | On renewal |
| SOC 2 report review | On each new report | On each new report | Not required |
| Breach monitoring | Continuous | Continuous | Quarterly |
| Contract compliance | Quarterly | Semi-annually | On renewal |
For a deeper look at how to automate these workflows, see our guide on third-party risk management automation.
Phase 5: Offboarding
Vendor offboarding is the most overlooked phase of the lifecycle. When a vendor relationship ends — whether through contract expiration, replacement, or termination for cause — a structured offboarding process ensures that access is revoked, data is handled appropriately, and residual risk is addressed.
Offboarding checklist:
- Revoke all vendor access to systems, environments, and data stores
- Disable vendor accounts in identity provider and SSO
- Revoke API keys and integration tokens
- Confirm data deletion or return per contractual terms
- Obtain written confirmation of data destruction where required
- Remove vendor from monitoring and assessment schedules
- Update vendor inventory and risk register
- Retain assessment records per your document retention policy
- Conduct lessons-learned review for critical vendors
The most common offboarding failure we see is leaving dormant vendor accounts active. In several client engagements, we have discovered active service accounts for vendors that were offboarded months or even years prior. These orphaned accounts represent a significant and entirely preventable attack surface.
Assessment Instruments in Detail
Choosing the right assessment instrument is a recurring question in vendor risk management. The answer depends on vendor tier, industry context, and what your stakeholders (auditors, regulators, customers) expect.
SIG Questionnaire
The Standardized Information Gathering questionnaire, maintained by Shared Assessments, is the gold standard for comprehensive third-party risk assessment. The full SIG covers 18 risk domains:
- Enterprise Risk Management
- Security Policy
- Organizational Security
- Asset and Information Management
- Human Resources Security
- Physical and Environmental Security
- IT Operations Management
- Access Control
- Application Security
- Cybersecurity Incident Management
- Operational Resilience
- Compliance and Legal
- Endpoint Device Security
- Network Security
- Privacy
- Threat Management
- Server Security
- Cloud Hosting Services
The full SIG is appropriate for Tier 1 critical vendors. For lower-tier assessments, SIG Lite provides coverage across the same domains with significantly fewer questions.
CAIQ
The Consensus Assessments Initiative Questionnaire from the Cloud Security Alliance is designed specifically for cloud service provider assessments. It aligns with the CSA Cloud Controls Matrix (CCM) and is particularly useful for evaluating SaaS, PaaS, and IaaS vendors. For a detailed comparison of when to use CAIQ versus SIG, see our CAIQ vs SIG analysis.
Custom Questionnaires
Many organizations supplement standardized instruments with custom questions addressing their specific requirements. This is appropriate when:
- You have regulatory requirements not fully covered by standard instruments (e.g., HIPAA-specific questions for healthcare data handlers)
- Your risk assessment framework includes criteria unique to your industry or business model
- You need to evaluate specific technical controls related to your integration architecture
What we advise against is using only custom questionnaires. Standardized instruments provide consistency, completeness, and comparability. Custom questions should supplement, not replace, standardized assessments.
SOC 2 Reports as Assessment Input
A vendor's SOC 2 Type II report is one of the most valuable inputs to your assessment process. It provides an independent auditor's opinion on the operating effectiveness of the vendor's controls over a defined period. When reviewing SOC 2 reports, focus on:
- The auditor's opinion. An unqualified opinion means the controls operated effectively. A qualified opinion identifies specific exceptions.
- Complementary User Entity Controls (CUECs). These are controls that the vendor expects you to implement. If you are not implementing them, the vendor's control environment has gaps.
- Exception notes. Read every exception. Minor exceptions (a single late access review) are different from systemic ones (no encryption at rest for three months).
- Subservice organizations. The report should disclose subservice organizations using either the inclusive or carve-out method. Under the carve-out method, the subservice organization's controls are excluded from the report scope — meaning you need to assess them separately.
For more on what auditors expect from evidence collection, see our SOC 2 evidence collection guide.
Fourth-Party Risk: Your Vendor's Vendors
Fourth-party risk — the risk introduced by your vendors' subprocessors and service providers — has emerged as one of the most challenging aspects of vendor risk management. You do not have a direct contractual relationship with these entities, yet their security failures can cascade through the supply chain to affect your organization.
Why Fourth-Party Risk Is Hard
The fundamental challenge is visibility. You can assess your vendors, but your vendors' vendors are largely opaque to you. You cannot send them a SIG questionnaire. You cannot review their SOC 2 reports (unless your vendor shares them). You often do not even know who they are.
This opacity creates concentration risk that is difficult to quantify. Consider how many SaaS vendors rely on the same cloud infrastructure providers, the same CDN providers, the same authentication services. A compromise at any of these shared dependencies affects multiple vendors simultaneously.
Practical Approaches to Fourth-Party Risk
While you cannot fully eliminate fourth-party risk, you can manage it through several strategies:
Contractual requirements. Require Tier 1 vendors to:
- Disclose their critical subprocessors
- Notify you of subprocessor changes
- Conduct their own vendor risk assessments
- Flow down security requirements to subprocessors
- Maintain incident notification obligations that include subprocessor incidents
Subprocessor assessment. For your most critical vendor relationships, request the vendor's own vendor risk assessment results for their key subprocessors. Some vendors will share this information under NDA.
Supply chain mapping. Build a dependency map that identifies shared dependencies across your vendor portfolio. If five of your critical vendors all rely on the same infrastructure provider, you have a concentration risk that warrants attention regardless of each individual vendor's assessment results.
Incident response planning. Develop incident response playbooks that account for supply-chain compromises. When the next SolarWinds-scale event occurs, you need a process to quickly identify which of your vendors are affected and what data or systems are at risk.
Lessons from Major Supply-Chain Incidents
| Incident | Year | Impact | Key Lesson |
|---|---|---|---|
| SolarWinds (Sunburst) | 2020 | ~18,000 organizations received compromised updates | Build systems are critical infrastructure — even trusted software can be weaponized |
| Kaseya (REvil) | 2021 | ~1,500 downstream businesses affected via MSPs | Managed service providers are high-value targets due to their access to client environments |
| Okta (LAPSUS$) | 2022 | 366 customers potentially affected | Identity provider compromises cascade to every integrated application |
| 3CX | 2023 | ~600,000 organizations potentially exposed | Supply-chain attacks can chain through multiple vendors |
| MOVEit (Cl0p) | 2023 | 2,500+ organizations, 67M+ individuals affected | File transfer tools with broad deployment create systemic risk |
These incidents share a common pattern: the attacker targets a vendor that has broad access or deployment across many organizations, then exploits that access to reach the ultimate targets. The lesson for vendor risk programs is that vendor criticality should account not only for the vendor's access to your data but also for the vendor's aggregate exposure across the ecosystem.
Building the Program: Practical Considerations
Governance Structure
A vendor risk management program needs clear ownership and governance. In our experience, the most effective structure includes:
- Program owner. A senior security or risk leader who owns the policy, methodology, and program metrics. This is often the CISO, VP of Security, or Head of GRC.
- Risk owners. The business unit leaders who sponsor each vendor relationship. They are accountable for ensuring their vendors comply with the program.
- Assessment team. The GRC analysts or security engineers who conduct assessments, review reports, and manage the ongoing monitoring workflow.
- Executive sponsor. A C-suite leader (often the CTO or CFO) who provides budget authority and escalation support.
Policy Framework
Your vendor risk management policy should document:
- Scope — which vendor relationships are subject to the program
- Roles and responsibilities for each participant
- Risk tiering methodology and criteria
- Assessment requirements by tier
- Monitoring cadence and data sources
- Escalation and exception procedures
- Offboarding requirements
- Record retention requirements
This policy is an artifact that SOC 2 auditors will ask to see. It should be reviewed and updated at least annually.
Tooling and Automation
Managing vendor risk at scale requires tooling beyond spreadsheets. Organizations typically outgrow spreadsheet-based programs around 50 vendors. Beyond that threshold, the operational burden of tracking assessments, monitoring deadlines, and maintaining records becomes unsustainable without dedicated tooling.
Modern vendor risk management platforms provide:
- Centralized vendor inventory and risk register
- Automated questionnaire distribution and collection
- Integration with security rating platforms
- Contract and compliance tracking
- Workflow automation for assessments and reviews
- Reporting and dashboards for executive visibility
For an in-depth look at automation capabilities and platform selection, see our guide on third-party risk management automation.
Metrics That Matter
What we tell clients is to track a small set of metrics that demonstrate program maturity and effectiveness:
| Metric | Target | Why It Matters |
|---|---|---|
| Vendor inventory completeness | 100% of vendors with data access cataloged | You cannot manage risk you do not know about |
| Tiering coverage | 100% of inventoried vendors tiered | Untiered vendors receive no assessment |
| Assessment completion rate | 100% of Tier 1, 90%+ of Tier 2 | Incomplete assessments leave gaps |
| Average assessment turnaround | Under 30 days for Tier 1, under 45 days for Tier 2 | Long turnaround delays onboarding and creates bottlenecks |
| Overdue reassessments | 0 for Tier 1, under 10% for Tier 2 | Stale assessments provide false confidence |
| Critical findings remediation | Under 60 days average | Identified risks that persist are accepted risk, not managed risk |
Common Pitfalls
In our experience building vendor risk programs across hundreds of clients, these are the most common failure modes:
-
Treating it as a checkbox exercise. Collecting questionnaire responses without actually reading and evaluating them provides compliance artifacts without risk reduction. If no assessment ever results in a finding or remediation request, the program is not adding value.
-
One-size-fits-all assessment. Sending the full 800-question SIG to every vendor, including the office coffee supplier, wastes everyone's time and creates vendor fatigue that undermines cooperation for the assessments that actually matter.
-
No ongoing monitoring. An annual assessment provides a point-in-time snapshot. A vendor can pass their annual review and suffer a catastrophic breach the following month. Continuous monitoring fills the gap.
-
Ignoring fourth-party risk. Assessing your vendors while ignoring their vendors leaves a significant blind spot, particularly for vendors with broad subprocessor dependencies.
-
No offboarding process. Failed vendor offboarding is one of the most common findings in SOC 2 audits. Dormant vendor accounts and retained data from terminated relationships represent unnecessary risk.
-
Lack of executive support. Vendor risk programs that lack executive sponsorship struggle to enforce assessment requirements with vendors who are uncooperative. When a critical vendor refuses to complete an assessment, you need executive air cover to escalate.
Vendor Risk Management for SOC 2
SOC 2 Trust Services Criteria directly address vendor risk management in several criteria:
- CC9.2 requires that the entity assesses and manages risks associated with vendors and business partners.
- CC3.2 requires identification and assessment of risks, including risks from external parties.
- CC2.3 requires communication with external parties regarding matters affecting the functioning of internal controls.
What auditors actually want to see during a SOC 2 examination is evidence that you have a structured, documented, and consistently executed vendor risk program. Specifically, they will look for:
- A written vendor risk management policy
- A complete vendor inventory with tier assignments
- Completed assessment records for all in-scope vendors
- Evidence of ongoing monitoring activities
- Documentation of findings, remediation actions, and risk acceptance decisions
- Evidence that the program is reviewed and updated periodically
The most common audit finding in this area is incomplete vendor inventories — organizations that have assessed their major vendors but have not cataloged and tiered the full population. Start with a complete inventory, even if the initial tiering is rough, and refine from there.
Getting Started
If you are building a vendor risk program for the first time, here is the sequence we recommend:
-
Build your vendor inventory. Catalog every vendor that accesses, processes, or stores your data, or that has connectivity to your systems. Pull from accounts payable records, SSO logs, and departmental surveys.
-
Define your tiering criteria. Use the three-tier model described above as a starting point. Adjust criteria based on your industry and regulatory requirements.
-
Tier your vendors. Apply your criteria to the inventory. You will likely find 5 to 15 Tier 1 vendors, 20 to 50 Tier 2 vendors, and everything else in Tier 3.
-
Assess Tier 1 first. Begin with your most critical vendors. Request SOC 2 reports, send the appropriate questionnaire instrument, and review the results.
-
Establish monitoring. Set up security rating monitoring for at least your Tier 1 vendors. Track SOC 2 report renewal dates.
-
Document the program. Write your vendor risk management policy, define your assessment procedures, and establish your governance structure.
-
Report to leadership. Present your initial findings and program metrics to executive stakeholders. This builds the support you need for ongoing investment.
The goal is not perfection on day one. The goal is a structured, documented program that demonstrates continuous improvement — which is exactly what your auditors, regulators, and customers want to see.
Frequently Asked Questions
Agency Team
Agency Insights
Expert guidance on cybersecurity compliance from Agency's advisory team.
LinkedIn