Vendor Security Assessment SOP¶
Sub-procedure for Operate pillar managed services - Third-party security assessment
Service Pillar: Operate Service Category: Vendor Risk Management Parent SOP: VRM Program SOP Engagement Type: Assessment / Annual Review
Overview¶
Comprehensive security assessment of third-party vendors to evaluate their security posture, identify risks, and ensure they meet organizational security requirements. This procedure covers the assessment process from questionnaire distribution through findings remediation and risk acceptance decisions.
Scope¶
Pillar: Operate (Managed Services) Service Area: Vendor Risk Management - Assessment
In Scope¶
- Security questionnaire assessment
- Documentation review (SOC 2, ISO 27001, etc.)
- Technical security evaluation
- Subcontractor/fourth-party assessment
- Finding identification and risk rating
- Remediation tracking
- Risk acceptance process
Out of Scope¶
- Penetration testing of vendor systems
- On-site audits (separate engagement)
- Contract negotiation
- Vendor selection/procurement decisions
Prerequisites¶
- Vendor identified for assessment
- Risk tier assigned (per VRM Program SOP)
- Vendor contact information
- Scope of services documented
- Data classification for vendor access
- Assessment timeline agreed
- Security requirements documented
Procedure¶
Step 1: Assessment Scoping¶
Objective: Define assessment scope based on vendor risk tier
Tier-Based Assessment Scope: | Tier | Questionnaire | Documentation | Technical | Duration | |------|--------------|---------------|-----------|----------| | 1 | Full SIG/CAIQ | SOC 2, pen test, etc. | Architecture review | 3-4 weeks | | 2 | Standard SIG | SOC 2 or ISO | Network diagram | 2-3 weeks | | 3 | Abbreviated | Self-attestation | None | 1-2 weeks | | 4 | Basic only | N/A | None | <1 week |
Scoping Activities: 1. Confirm vendor risk tier 2. Identify data types accessed 3. Document system integration points 4. Determine regulatory requirements 5. Select appropriate questionnaire 6. Define documentation requirements 7. Set assessment timeline
Scope Documentation: - [ ] Vendor name and services - [ ] Data classification - [ ] Integration architecture - [ ] Applicable regulations - [ ] Assessment components - [ ] Key contacts - [ ] Timeline and milestones
Duration: 2-4 hours
Step 2: Questionnaire Distribution¶
Objective: Collect security posture information from vendor
Questionnaire Options: | Questionnaire | Use Case | Questions | |---------------|----------|-----------| | SIG Core | Tier 1-2, comprehensive | ~200-300 | | SIG Lite | Tier 2-3, streamlined | ~70-100 | | CAIQ | Cloud services | ~200+ | | Custom | Specific requirements | Variable | | Self-attestation | Tier 3-4, low risk | ~20-30 |
Distribution Process: 1. Prepare questionnaire with pre-filled context 2. Draft introduction email 3. Set response deadline (typically 2-3 weeks) 4. Provide vendor contact for questions 5. Send questionnaire 6. Track receipt confirmation 7. Send reminder at midpoint 8. Follow up on overdue responses
Questionnaire Domains: - [ ] Information Security Governance - [ ] Access Control - [ ] Data Protection - [ ] Network Security - [ ] Application Security - [ ] Incident Response - [ ] Business Continuity - [ ] Compliance - [ ] Subcontractor Management
Duration: 2-3 weeks vendor response time
Step 3: Documentation Review¶
Objective: Analyze vendor-provided security documentation
Documentation Types: | Document | Purpose | Tier Requirement | |----------|---------|------------------| | SOC 2 Type II | Controls attestation | Tier 1-2 | | ISO 27001 cert | ISMS certification | Tier 1-2 | | Penetration test | Vulnerability assessment | Tier 1 | | Security policy | Governance documentation | Tier 1-2 | | Network diagram | Architecture understanding | Tier 1-2 | | BC/DR plan | Resilience capability | Tier 1 | | Insurance cert | Risk transfer | Tier 1-2 |
SOC 2 Review Checklist: - [ ] Report covers relevant period - [ ] Trust service criteria appropriate - [ ] Review user entity responsibilities - [ ] Identify exceptions/findings - [ ] Assess complementary controls - [ ] Check subservice organization coverage
Documentation Red Flags: | Finding | Risk Level | Action | |---------|------------|--------| | No SOC 2/ISO cert | High | Require alternative evidence | | Qualified opinion | High | Review findings closely | | Gaps in coverage period | Medium | Request bridge letter | | Excluded systems | Medium | Assess if relevant | | Open findings | Variable | Assess remediation |
Duration: 4-8 hours
Step 4: Technical Assessment¶
Objective: Evaluate technical security controls (Tier 1 vendors)
Technical Review Components:
Architecture Review: - [ ] Network segmentation - [ ] Data flow mapping - [ ] Encryption in transit/at rest - [ ] Authentication mechanisms - [ ] API security - [ ] Integration security
Security Control Verification: - [ ] Endpoint protection - [ ] Logging and monitoring - [ ] Vulnerability management - [ ] Patch management - [ ] Access controls - [ ] Backup procedures
Cloud Security (if applicable): - [ ] Cloud provider certifications - [ ] Shared responsibility understanding - [ ] Configuration management - [ ] Identity management - [ ] Data residency
Duration: 4-8 hours (Tier 1 only)
Step 5: Finding Analysis and Risk Rating¶
Objective: Identify and prioritize security gaps
Finding Categories: | Category | Examples | |----------|----------| | Governance | Missing policies, no security team | | Access Control | No MFA, excessive permissions | | Data Protection | No encryption, weak DLP | | Technical | Unpatched systems, poor segmentation | | Operations | No monitoring, poor incident response | | Compliance | Missing certifications, audit findings |
Risk Rating Matrix: | Likelihood | Impact: Low | Impact: Medium | Impact: High | |------------|-------------|----------------|--------------| | High | Medium | High | Critical | | Medium | Low | Medium | High | | Low | Low | Low | Medium |
Finding Documentation: - [ ] Finding description - [ ] Evidence/source - [ ] Risk rating - [ ] Potential impact - [ ] Recommended remediation - [ ] Remediation timeline - [ ] Compensating controls
Duration: 4-8 hours
Step 6: Assessment Report and Risk Decision¶
Objective: Document findings and obtain risk decision
Assessment Report Sections: 1. Executive Summary 2. Vendor Overview 3. Scope and Methodology 4. Documentation Review Summary 5. Technical Assessment Summary 6. Findings and Recommendations 7. Risk Rating 8. Conclusion and Recommendation
Risk Decision Options: | Decision | Criteria | Action | |----------|----------|--------| | Approve | No critical/high findings | Proceed with relationship | | Conditional | High findings with remediation plan | Approve with conditions | | Accept Risk | High findings, business necessity | Document risk acceptance | | Reject | Critical findings, no mitigation | Do not engage/terminate |
Risk Acceptance Requirements: - [ ] Business justification documented - [ ] Compensating controls identified - [ ] Time-limited acceptance - [ ] Executive sponsor approval - [ ] Periodic reassessment scheduled
Duration: 4-6 hours
Step 7: Remediation Tracking¶
Objective: Monitor vendor remediation of identified findings
Remediation Process: 1. Share findings with vendor 2. Request remediation plan 3. Agree on timelines 4. Track remediation progress 5. Validate remediation evidence 6. Update finding status 7. Close assessment or escalate
Remediation Timelines: | Risk Level | Target Remediation | Escalation | |------------|-------------------|------------| | Critical | 30 days | Immediate if no plan | | High | 60 days | 30 days if no progress | | Medium | 90 days | 60 days if no progress | | Low | Next assessment | Track only |
Duration: Ongoing until remediation complete
Deliverables¶
| Deliverable | Format | Owner |
|---|---|---|
| Completed Questionnaire | Excel/GRC | Vendor (reviewed by Analyst) |
| Documentation Analysis | Word | Technical Analyst |
| Technical Assessment Notes | Word | Lead Consultant |
| Finding Register | Excel | Technical Analyst |
| Vendor Assessment Report | PDF/Word | Lead Consultant |
| Risk Decision Memo | Word | Engagement Manager |
| Remediation Tracker | Excel/GRC | Technical Analyst |
Quality Gates¶
- Assessment scope documented and approved
- Questionnaire fully completed by vendor
- Documentation reviewed and analyzed
- Technical assessment completed (if required)
- Findings documented with risk ratings
- Assessment report reviewed by senior consultant
- Risk decision obtained and documented
- Remediation plan agreed (if applicable)
- Assessment recorded in vendor inventory
Related Documents¶
Last Updated: February 2026