Skip to main content

Vendor Risk Assessment

Evidence by Tier

Ask for the right evidence based on the vendor’s tier—nothing more, nothing less. Keep requests predictable for auditors and vendors.

Low risk

Light coverage for vendors with low sensitivity, low access, or low criticality.

  • Security questionnaire (lite) mapped to your controls
  • DPA if any PII is processed
  • Policy attestations for access control and incident response
  • Annual attestation on changes and incidents

Medium risk

Vendors touching customer data or with meaningful access.

  • SOC 2 Type II or ISO 27001 (or roadmap + compensating controls)
  • Incident response summary and notification SLAs
  • Access control overview with MFA/SSO enabled
  • Vendor/subprocessor list with regions
  • BCP/DR summary and test cadence
  • Quarterly attestations for changes or incidents

High risk

Vendors with privileged access, regulated data, or bi-directional integrations.

  • SOC 2 Type II (preferred) with bridge letter if timing requires
  • Recent pentest summary or third-party assessment with remediation status
  • Detailed IR playbooks and BCP/DR evidence
  • Data flow diagrams and architecture overview
  • Security addendum with clear liability and notification terms
  • Semiannual reassessment or continuous monitoring subscription

Practical tips

  • Accept equivalent evidence (e.g., ISO + SOC bridge letter) when appropriate.
  • Timebox follow-ups and capture exceptions with remediation targets.
  • Store evidence and notes in one location for audits and security questionnaires.
Premium Resource

Evidence Request Templates (DOCX)

Download our pre-written evidence request templates for Low, Medium, and High risk vendors. Save dozens of hours on vendor follow-ups.

  • Fully editable template
  • Built for 2026 Audit Standards

We'll use this to send your resource and occasional security updates.

By downloading, you agree to receive RiscLens updates. Secure 256-bit encryption.