Assessment for third-party vendor security, risk assessments, business associate agreements, and vendor lifecycle management
Risk tiers: Critical (PHI/PII access), high (network access), medium (limited data), low (no sensitive data); different assessment depth
Questionnaires: Standardized Information Gathering (SIG), Consensus Assessments Initiative Questionnaire (CAIQ), domain-specific
Financial due diligence: Credit rating, bankruptcy risk, insurance coverage, escrow for source code
SOC 2: Service Organization Control report, Type II includes testing over 6-12 months, review exceptions and management responses
Security testing: Annual pentest for critical vendors, continuous vulnerability scanning, remediation timelines for findings
Certifications: ISO 27001 (international standard), HITRUST CSF (healthcare), FedRAMP (government), verify scope and validity
BAA requirements: Permitted uses/disclosures, safeguards, breach notification (within 60 days), subcontractor agreements
Security clauses: Data encryption at rest/transit, MFA, logging, right to audit, incident notification, indemnification
DPA/GDPR: Standard Contractual Clauses (SCC) for EU data, UK Addendum, data localization, cross-border transfer mechanisms
Reassessment triggers: Annual review, service changes, breach/incident, certification expiration, M&A activity
Performance metrics: Uptime SLA, response time, issue resolution, security incident rate, compliance attestations
Incident tracking: Vendor breach notifications, impact assessment, remediation verification, contract review
IR coordination: Vendor notification requirements (24-hour), escalation procedures, communication protocols, joint exercises
Breach notification: Vendor obligation to notify, timeline in contract, required information (scope, affected data, remediation)
CAP: Vendor remediation timeline, milestone tracking, verification testing, escalation for missed deadlines
Offboarding: Data return in usable format, Certificate of Destruction for retained copies, verify deletion from backups
Access removal: VPN, application accounts, physical access, API keys, SSH keys; verify in access logs
Data removal: Documented deletion, Certificate of Destruction, validate via audit logs or attestation
Please answer all required questions to see your results