Third-party vendor risk is assessed and managed
Your security posture is only as strong as the vendors and partners you rely on. Data breaches frequently originate from third-party providers who have access to your environment or data. This criterion requires that vendor risk is formally assessed before onboarding new vendors and reviewed periodically, particularly for vendors with access to sensitive data or critical systems.
Implementation steps
- 1
Maintain a vendor inventory with risk classification
Create a list of all vendors and subprocessors that have access to customer data or that provide critical infrastructure for your service. Classify each by risk: high (direct access to customer data or production systems), medium (business systems with indirect access), low (no access to sensitive data). Focus security review effort on high-risk vendors.
notion google-sheets confluence vanta - 2
Conduct security assessments for high-risk vendors
Before onboarding a high-risk vendor, review their security posture: do they have a SOC 2 report, ISO 27001 certification, or similar? Review their security questionnaire responses. Understand what data they will have access to and under what conditions. Establish contractual requirements: data processing agreements, breach notification timelines, and security obligations.
vanta whistic secureframe google-docs - 3
Review high-risk vendor compliance annually
Vendor security posture changes over time. For high-risk vendors, collect and review their SOC 2 report or equivalent annually. Verify that they still meet your requirements. Update your vendor risk register with the review date and findings. Establish a process to handle vendor notification of security incidents.
notion google-sheets vanta
Evidence required
Vendor inventory
A list of third-party vendors with risk classifications.
- - Vendor inventory spreadsheet with risk tier and data access columns
- - Subprocessor list from Vanta or compliance platform
- - Third-party risk register
Vendor security assessments
Evidence that high-risk vendors have been assessed.
- - Vendor SOC 2 reports collected and reviewed
- - Security questionnaire responses from high-risk vendors
- - Data processing agreements with key vendors
Related controls
Risk mitigation strategies are identified and implemented
Risk Mitigation
Commitment to integrity and ethical values is demonstrated
Control Environment
Board or equivalent body oversees security risk
Control Environment
Organizational structure and authority for security is defined
Control Environment