Vendor Risk Assessment
Right-size your vendor risk management for SOC 2.
Automate vendor risk tiering and review cycles to reduce third-party risk and save time. Validate your approach before the audit.
Validate this with a compliance expert
Confirm readiness before engaging an auditor. No sales demo.
Guidance only; align outcomes with your risk team. Last updated: 2026-03-20.
What is a vendor risk assessment?
A vendor risk assessment (VRA) evaluates a third-party provider’s security and operational risk before sharing data or granting access. It typically includes a questionnaire, evidence review (e.g., SOC 2/ISO), and a risk rating that determines required controls and reassessment frequency.
Learn moreVRA ROI Calculator
Interactive ToolCalculate annual savings and efficiency gains from automating vendor security reviews.
Vendor Tiering Tool
Interactive ToolNew: Right-size your reviews by instantly scoring vendors into risk tiers.
VRA Triage Tool
Interactive ToolScore vendor risk in minutes with risk-based scoring logic and evidence expectations.
VRA Questionnaire
Interactive ToolHigh-intent questionnaire with evidence expectations and scoring tips.
VRA Checklist
Prep list for intake, due diligence, contracts, and ongoing monitoring.
Scoring Model
How the VRA tiers map to control asks and cadence.
Evidence by Tier
Evidence packs to request at Low, Medium, and High risk.
Monitoring Cadence
Right-size follow-up frequency and attestation rhythm.
Contract Clauses
Security addenda and DPAs that match the risk tier.
Subprocessors vs Vendors
How to track chains of custody and downstream risk.
Common Mistakes
Avoid over-collecting evidence or missing critical signals.
SOC 2 Requirements
The 5 core vendor oversight controls required for a SOC 2 audit.
Automation vs Manual
Compare different approaches to managing third-party security risk.
Why this matters for SOC 2
Vendor management is a core SOC 2 control area. Clear triage, evidence expectations, and contract requirements reduce friction with auditors and speed up security questionnaires from your customers.
- •Tier vendors consistently to avoid over-collecting evidence from low-risk suppliers.
- •Align contract clauses with data sensitivity and access, not guesswork.
- •Keep a single “evidence-by-tier” checklist so reviews are predictable.
How it works
- Run the triage to set risk tier, cadence, and evidence asks.
- Pull the checklist and evidence-by-tier guidance for intake and contract reviews.
- Share the monitoring cadence with control owners and track attestations.
Use as guidance—align asks with your security, legal, and compliance owners.
Related high-intent VRA guides
SaaS vendors
Focus on multi-tenant data handling, support access controls, and change evidence. Keep cadence annual + quarterly attestations.
Triage SaaS VendorsFintech vendors
Triage Fintech VendorsHealthcare vendors
PHI drives deeper review of subprocessors, breach notice, and IR/BCP evidence; cadence often semiannual.
Triage Healthcare VendorsB2B APIs
Data flows and scopes matter most; show auth, rate limits, and logging. Annual reviews with quarterly attestations work well.
Triage B2B APIsScore vendor risk in minutes.
Free · No signup · Instant results
