This post was originally published November 12, 2015 and has been updated for accuracy and comprehensiveness
There are so many necessary steps involved in creating a comprehensive vendor risk management (VRM) program. Since we understand how much of a time investment it is to get your VRM program up and running — and because we acknowledge that vendor cybersecurity should be a top priority — we’ve created this guide that offers 40 questions ask your vendors and a cybersecurity IT risk assessment template.
You know that understanding the cybersecurity posture of your vendors is vital when you’re getting involved in third-party business relationships. If you want to create a scalable and sustainable vendor risk management (VRM) program, it’s important to include a security risk assessment component.
But what you may not know is which high-level questions you should consider including in your vendor security assessment. You’re probably wondering what to include, which frameworks to use, and why you should be including certain questions and not others. These are all valid concerns!
Our goal is to help you get started with the creation of your vendor security risk assessment so you can establish a third-party risk management program that you can feel confident in. This is not intended to be an out-of-box security assessment solution, but rather, a guide to get you headed in the right direction. We’ll explain the top three frameworks you should be examining, questions you may want to consider (and why you should consider them), and what else to include in your VRM program.
Every organization — and every vendor — is unique. Thus, many circumstances will warrant the creation of customized cybersecurity risk assessment questionnaires. But we suggest relying on the expertise of others for high-level questions (rather than reinventing the wheel yourself) and using industry-accepted best practices as a starting point for your cyber risk assessment.
There are three industry-standard security assessment methodologies you can start with:
Between these three methodologies, there are literally thousands of questions that you could use. For instance, if you go to the SANS Top 20 Critical Security Controls page and select “Malware Defenses,” there are 11 items beneath it that could all represent their own separate questions. Of course, we can’t fit all of that information here. The idea behind this guide is to give you an idea of the high-level, critical questions you should consider asking your vendors in your risk assessment.
From governance and organizational structure to security controls and technology, this ebook will walk you through the high-level questions you shouldn’t leave out of your vendor cybersecurity IT risk assessment. Additionally, we’ve provided important context around every question in the ebook, so you can understand why we’ve included these questions and why including them in your IT risk assessment template may be a good idea.
Some sample questions include:
In this ebook, we also answer tough questions about whether a security risk assessment alone offers enough visibility into your vendor and how you can make sure your security program is effective.
Data breaches that originate through third parties are more commonplace than organizations are used to. The SolarWinds hack and Kaseya ransomware attack are two recent examples of threat actors exploiting the security practices of...
Organizations rely on third-parties to keep competitive in the marketplace. The EY global third-party risk management survey highlights that in 2019–20, over 33% of the 246 global companies surveyed were managing and monitoring third-party...
Third parties are essential to helping your business grow and stay competitive. But if you’re not careful, your trusted partnerships can introduce unwanted cyber risk and overhead into your organization.
© 2026 BitSight Technologies. All Rights Reserved. | Privacy Policy | Security | For Suppliers
Contact Us | BitSight Technologies | 111 Huntington Ave, Suite 2010, Boston, MA 02199 | +1-617-245-0469