Skip to main content

Vendor Risk Assessment

Contract Clauses

Align security exhibits and DPAs with vendor risk tier so legal negotiations stay proportional and audit-ready.

Security addendum essentials

  • Breach notification timelines and required detail.
  • Access control expectations (SSO, MFA, logging).
  • Change management and incident response contacts.
  • Right to request evidence by tier (SOC, pentest, diagrams).

Data Processing Agreement (if PII/PHI)

  • Lawful basis, purpose limitation, and data minimization.
  • Subprocessor approval and notification requirements.
  • Data residency/transfer terms and encryption standards.
  • Retention and deletion SLAs, including backups.

For high-risk vendors

  • Audit/assessment rights scoped to security and privacy controls.
  • Penetration test or independent assessment cadence.
  • Business continuity and disaster recovery testing expectations.
  • Stronger liability caps or carve-outs tied to data sensitivity.

Negotiation tips

  • Scale requests to the tier; avoid slowing low-risk deals with heavy exhibits.
  • Accept equivalent evidence (e.g., ISO + bridge letter) when SOC timing is tight.
  • Clarify who must approve subprocessor additions and how notice is delivered.