Third-Party & Vendor Management
Comprehensive vendor risk management documentation for assessing, monitoring, and managing third-party security and compliance risks.
Vendor Assessment
Vendor Risk Management Policy
RequiredComprehensive policy defining vendor risk assessment, classification, due diligence requirements, and ongoing monitoring procedures based on risk tier.
Vendor Security Questionnaire
CriticalComprehensive security assessment questionnaire based on SIG Lite covering security controls, compliance certifications, incident history, and data handling.
Vendor Risk Assessment Template
Per VendorStandardized risk assessment template for evaluating vendor inherent risk, control effectiveness, and residual risk with scoring methodology.
Vendor Inventory & Classification
Quarterly UpdateTemplate for maintaining vendor inventory with risk classification (Critical, High, Medium, Low) and data access categorization.
Contracts & Agreements
Vendor Security Requirements Addendum
Contract RequiredSecurity addendum for vendor contracts specifying security controls, audit rights, incident notification, data handling, and termination requirements.
Non-Disclosure Agreement (NDA)
RequiredMutual and one-way NDA templates for protecting confidential information shared with vendors, including definition of confidential information and obligations.
Business Associate Agreement (BAA)
HIPAA RequiredHIPAA-compliant BAA for vendors handling Protected Health Information (PHI), including permitted uses, safeguard requirements, and breach notification.
Ongoing Management
Vendor Review & Monitoring Procedures
Annual for CriticalProcedures for ongoing vendor monitoring including SOC report review, compliance certificate tracking, performance metrics, and reassessment triggers.
Vendor Risk Tiers
| Risk Tier | Criteria | Assessment | Review Frequency |
|---|---|---|---|
| Critical | Access to sensitive data, critical systems, or customer-facing | Full questionnaire + SOC 2/ISO review + onsite (optional) | Annual |
| High | Limited sensitive data or internal system access | Full questionnaire + compliance review | Annual |
| Medium | No sensitive data, limited system access | Abbreviated questionnaire | Every 2 years |
| Low | No data access, commoditized services | Self-attestation | Every 3 years |
All 8 vendor management documents with implementation guides.
Review SOC Reports
For critical vendors, always obtain and review their SOC 2 Type II report. Document any CUECs (Complementary User Entity Controls) that apply to you.
Related Categories
Key Requirements
- Assess before onboarding
- Include security in contracts
- Monitor ongoing compliance
- Document all assessments
Important Notice
These templates provide a starting point for vendor management programs. Adjust risk criteria and assessment depth based on your industry, data sensitivity, and regulatory requirements.
Need Help with Vendor Risk Management?
Our team can help you build a vendor management program, conduct assessments, and ensure your third-party risk is properly managed.