Back to Resources
Vendor Security Posture Assessment Questionnaire — visual preview
Questionnaire

Vendor Security Posture Assessment Questionnaire

Third-Party Risk Evaluation Framework

Overview

Before you hand a vendor your data or let them connect to your network, you need to know what their security looks like from the inside. This questionnaire gives you a structured way to evaluate vendors across the areas that matter most: how they handle your data, who has access, how they respond to incidents, and whether they can prove compliance when asked. It is designed to be practical for both the team sending it and the vendor filling it out.

Assessment Domains

  • Organizational security governance and leadership
  • Data protection, encryption, and classification practices
  • Identity and access management controls
  • Network security architecture and segmentation
  • Incident response capabilities and breach history
  • Business continuity and disaster recovery readiness
  • Compliance certifications and audit reports
  • Subprocessor and fourth-party risk management

Risk Tiering Framework

TierCriteriaAssessment depth
CriticalProcesses or stores sensitive data, has network access, or supports revenue-critical functionsFull questionnaire, SOC 2 report review, onsite or virtual assessment
HighAccesses internal systems or handles moderate-sensitivity dataFull questionnaire plus evidence requests
MediumLimited data access, no direct system connectivityAbbreviated questionnaire with self-attestation
LowNo data access, no system connectivity, commodity servicesAutomated risk scoring with periodic reassessment

How to Evaluate Responses

Look beyond yes-or-no answers. Ask for evidence: screenshots of configurations, copies of policies, recent penetration test summaries, and SOC 2 or ISO 27001 reports. Pay close attention to how the vendor handles access reviews, vulnerability patching timelines, and incident notification commitments. A vendor that says they encrypt data at rest but cannot specify the algorithm or key management approach is a red flag. Score each domain on a 1-to-5 maturity scale and set minimum thresholds per risk tier.

Common Vendor Red Flags

  • No SOC 2, ISO 27001, or equivalent third-party audit in the past 18 months
  • Inability to provide a documented incident response plan
  • Shared credentials or no MFA for administrative access
  • No encryption at rest or in transit for customer data
  • Refusal to disclose subprocessors or fourth-party dependencies
  • No defined SLA for breach notification timelines

Integration with Your TPRM Program

This questionnaire works best when it is part of a broader third-party risk management lifecycle. Use it during vendor onboarding, then schedule periodic reassessments based on the risk tier. Critical vendors should be reassessed annually at minimum, with continuous monitoring through tools that track breach disclosures, certificate expirations, and dark-web mentions. Store all vendor assessments in a central repository so your procurement, legal, and security teams all work from the same data.

Frequently Asked Questions

How long should a vendor have to complete the questionnaire?

Give vendors two to three weeks for a full questionnaire. For critical-tier vendors, schedule a follow-up call to walk through responses and clarify any gaps.

Should we accept a SOC 2 report instead of the questionnaire?

A SOC 2 Type II report covers many of the same areas, but it does not address how the vendor handles your specific data. Use the report to pre-fill sections and focus your questionnaire on gaps the report does not cover.

How do we handle vendors that refuse to answer?

Document the refusal and escalate to procurement and legal. Consider whether the vendor relationship is worth the unquantified risk. In some cases, contractual language can require security transparency as a condition of doing business.

What is the difference between this and a SIG questionnaire?

The Standardized Information Gathering (SIG) questionnaire is a widely used industry standard with over 800 questions. This template is more concise and practical for organizations that need a faster assessment without sacrificing coverage of the critical domains.

How often should vendor assessments be repeated?

Critical vendors should be reassessed annually. High-tier vendors every 18 months. Medium and low-tier vendors every two to three years, unless a material change or breach triggers an earlier review.

Ready to use this resource?

Download it now or schedule a demo to see how Hunto AI can automate your security workflows.

Book a Demo

© 2026 Hunto AI. Copyright. All Rights Reserved