
Third-Party Vendor Risk Assessment: Practical Guide + Free Template (2026)
Learn how to conduct a third-party vendor risk assessment step by step. Covers what to assess, how to score risk, NIS2 and DORA requirements, and a free assessment template.
Third-Party Vendor Risk Assessment: Practical Guide + Free Template (2026)
A third-party vendor risk assessment is the structured process that determines whether a vendor can be trusted with your data, systems, or services — and what controls you need to verify before you sign the contract. This guide explains how to run an assessment from start to finish, what to look for at each stage, and how to score risk consistently across your vendor portfolio.
The framework aligns with ISO 27001:2022 (Annex A 5.19–5.21), NIS2 Article 21(2)(d), and DORA Articles 28–30.
Why Third-Party Risk Assessment Matters
Your security posture is only as strong as your weakest vendor. According to the Verizon 2024 Data Breach Investigations Report, 15% of all breaches involved a third party — and third-party breaches are growing faster than direct attacks. Regulators have taken notice.
The core problem: most organizations still run vendor assessments as one-off events at onboarding, then file the results and never revisit them. A vendor that passed a 2022 assessment may look very different in 2026 — new sub-processors, acquired by a different owner, or operating on infrastructure with known vulnerabilities.
Effective third-party risk assessment is:
- Proportionate — critical vendors get full assessments; low-risk vendors get lightweight checklists
- Evidence-based — certifications and audit reports, not just questionnaire responses
- Continuous — ongoing monitoring, not just point-in-time snapshots
- Documented — auditors and regulators expect written records
Step 1: Classify the Vendor Before You Assess
Before applying any template, determine how deep an assessment is warranted. Applying the same 80-question questionnaire to both your coffee machine vendor and your cloud infrastructure provider wastes time on both ends.
Inherent Risk Factors
Score each factor on a 1–4 scale (Low / Medium / High / Critical):
| Factor | Low (1) | Medium (2) | High (3) | Critical (4) |
|---|---|---|---|---|
| Data sensitivity | Public data only | Internal data | Confidential/personal data | Special category / regulated data |
| Data volume | None | Limited | Moderate | Large scale |
| System access | No access | Read-only access | Write access | Admin / privileged access |
| Service criticality | Nice-to-have | Operational support | Business-important | Mission-critical |
Tier assignment based on total score:
- 4–7: Tier 3 — lightweight assessment (20–30 item checklist)
- 8–11: Tier 2 — standard assessment (40–60 questions + document review)
- 12–16: Tier 1 — full assessment (80+ questions + document review + site visit or third-party audit)
Step 2: Send the Assessment Questionnaire
The questionnaire captures the vendor's self-reported controls. It is one input to the assessment — not the assessment itself.
Core Questionnaire Domains
Domain 1: Information Security Controls
- Do you have a documented information security policy reviewed within the last 12 months?
- What access control mechanisms are in place for systems handling our data?
- Describe your encryption standards for data at rest and in transit.
- How are privileged accounts managed and monitored?
- What is your patch management cycle for critical vulnerabilities?
- Describe your incident detection and response capabilities.
- Do you conduct penetration testing? How frequently, and by whom?
Domain 2: Compliance and Certifications
- Which certifications do you currently hold? (ISO 27001, SOC 2 Type II, ISO 27701, PCI-DSS, etc.)
- Provide the most recent certificate with validity dates.
- Are you subject to NIS2 or DORA requirements? What is your compliance status?
- When was your last external audit? Provide a summary or executive report.
Domain 3: Data Handling and Privacy
- In which countries is our data stored and processed?
- Provide a complete list of sub-processors accessing our data.
- What are your data retention and deletion procedures?
- Describe your data breach notification process and timeline.
- Do you conduct DPIAs for high-risk processing activities?
Domain 4: Business Continuity
- What is your Recovery Time Objective (RTO) for a full service outage?
- What is your Recovery Point Objective (RPO)?
- When was your last BCP/DR test? Provide results summary.
- Do you have geographic redundancy for systems handling our data?
Domain 5: Financial and Operational Stability
- Provide your most recent audited financial statements or equivalent evidence.
- Do you carry cyber liability insurance? What is the coverage amount?
- Describe key person dependencies in your security function.
Domain 6: Sub-contractor and Supply Chain Risk
- List all sub-contractors with access to our data or systems.
- Describe how you assess and monitor your own sub-contractors.
- Do you have a right to audit clause in sub-contractor agreements?
Step 3: Review Evidence Documents
Questionnaire responses require verification. A vendor claiming ISO 27001 certification means nothing without the certificate. Request and review these documents:
| Claim | Required Evidence |
|---|---|
| ISO 27001 certified | Current certificate from accredited body (check expiry + scope) |
| SOC 2 Type II | Full SOC 2 report (not just the summary letter) |
| Penetration tested | Executive summary from independent tester + remediation log |
| GDPR compliant | DPA template, sub-processor list, data transfer mechanism |
| BCP/DR tested | Test report with date, scenario, and results |
| Financially stable | Annual report or audited accounts (recent) |
Red flags during document review:
- ISO 27001 certificate scope excludes the systems that will handle your data
- SOC 2 report is Type I (not Type II) — this tests design only, not operating effectiveness
- Pen test was conducted more than 18 months ago with no follow-up
- Certificate is from an unknown or non-accredited body
- Sub-processor list is incomplete or unavailable ("confidential")
Step 4: Score the Risk
Combine inherent risk (Step 1) with control effectiveness to calculate residual risk.
Control Effectiveness Rating
After reviewing questionnaire responses and documents, rate the vendor's controls:
- Strong — certified, recently audited, evidence matches claims, no material findings
- Adequate — certified or audited, minor gaps identified, remediation plan in place
- Weak — self-reported only, gaps identified, no evidence of remediation
- Insufficient — no certifications, audit report unavailable, significant gaps
Residual Risk Matrix
| Inherent Risk | Strong Controls | Adequate Controls | Weak Controls | Insufficient Controls |
|---|---|---|---|---|
| Low | Low | Low | Medium | Medium |
| Medium | Low | Medium | Medium | High |
| High | Medium | High | High | Critical |
| Critical | High | High | Critical | Critical |
Decision by Residual Risk
| Residual Risk | Decision | Requirements |
|---|---|---|
| Low | Auto-approve | Standard contract + DPA |
| Medium | Approve with conditions | Additional contract clauses, remediation timeline |
| High | Leadership sign-off required | Risk acceptance sign-off + enhanced monitoring |
| Critical | Reject or escalate | Vendor must remediate before approval, or find alternative |
Step 5: Document the Assessment
Every assessment must produce a written record. Regulators under NIS2 and DORA require organizations to demonstrate supply chain risk management — which means documentation, not just good intentions.
Assessment record must include:
- Vendor name, classification, and services in scope
- Assessment date and assessor
- Questionnaire version used
- Evidence documents reviewed (with dates)
- Risk scores: inherent risk, control effectiveness, residual risk
- Approval decision and approver name
- Any conditions, remediation requirements, or risk acceptances
- Next scheduled review date
Store assessments in a centralized system accessible to your compliance and legal teams, not in individual email threads or spreadsheets.
NIS2 and DORA Requirements for Third-Party Assessments
NIS2 (Article 21(2)(d))
NIS2-affected organizations must implement risk management measures addressing supply chain security. This means:
- Pre-engagement assessment — documented before onboarding critical vendors
- Contractual security requirements — minimum security standards written into contracts
- Ongoing monitoring — not just point-in-time; continuous monitoring of critical suppliers
- Incident notification — vendors must notify you of relevant security incidents
The NIS2 competent authorities have indicated they expect organizations to maintain a documented vendor inventory with risk classifications.
DORA (Articles 28–30)
Financial entities under DORA face stricter requirements for ICT third-party risk:
- Pre-contract risk assessment required for all ICT providers
- Concentration risk assessment — evaluate whether you are over-dependent on a single provider
- Exit strategy — document how you would exit the relationship if the vendor fails
- Right to audit — contracts must include audit rights for the entity and regulators
- Critical ICT providers — enhanced due diligence and EBA/ESA notification requirements
Ongoing Monitoring After Assessment
Approval is not the end of the process — it is the beginning. Vendor risk changes continuously.
Monitoring activities by vendor tier:
| Activity | Tier 1 (Critical) | Tier 2 (Standard) | Tier 3 (Low-risk) |
|---|---|---|---|
| Re-assessment | Annual | 18–24 months | 3 years or contract renewal |
| Certificate monitoring | Continuous | On renewal | On renewal |
| Security news monitoring | Continuous | Quarterly | As needed |
| Incident notification review | Any incident | Material incidents | Critical incidents only |
| Sub-processor change review | All changes | Material changes | Not required |
Trigger events that require immediate re-assessment regardless of schedule:
- Vendor reports a security incident affecting your data
- Vendor is acquired by a new owner
- Significant change to the services or infrastructure in scope
- Vendor loses a key certification
- Media reports of breach, financial distress, or regulatory action
Common Mistakes to Avoid
Treating questionnaires as assessments. A questionnaire captures what the vendor claims. Without document review and independent verification, you have no basis for a risk decision.
Applying one tier to all vendors. Over-assessing low-risk vendors wastes time and reduces vendor cooperation. Under-assessing critical vendors creates blind spots.
Skipping sub-processor review. Your risk does not stop at your direct vendor. If they use sub-processors with weaker controls, those become your risk too.
Approving without conditions. Medium and high residual risk vendors can be approved — but only with documented conditions: remediation timelines, enhanced contract clauses, or additional monitoring.
No re-assessment trigger. Schedule-based re-assessment alone misses the most dangerous moments: post-acquisition, post-incident, and post-scope change.
Third-Party Vendor Risk Assessment Template
Use this summary checklist as your assessment record. For the full 80-question questionnaire by domain, refer to the Vendor Risk Assessment Template.
Pre-Assessment
- Vendor classified (Tier 1 / 2 / 3)
- Inherent risk scored (data sensitivity, volume, access, criticality)
- Assessment tier confirmed with risk owner
Questionnaire and Document Review
- Questionnaire sent and returned
- ISO 27001 / SOC 2 certificate reviewed (scope and expiry verified)
- Penetration test report reviewed (date + remediation status)
- Sub-processor list obtained
- DPA reviewed (data location, retention, deletion)
- BCP/DR test report reviewed
- Financial stability evidence obtained
Scoring and Decision
- Control effectiveness rated (Strong / Adequate / Weak / Insufficient)
- Residual risk calculated
- Approval decision documented
- Conditions or remediation requirements recorded
- Risk acceptance signed (if High residual risk)
- Assessment record stored in vendor register
Post-Approval
- DPA and security contract clauses signed
- Monitoring frequency set
- Next re-assessment date calendared
- Incident notification workflow confirmed with vendor
How Orbiq Automates Vendor Risk Assessments
Running this process manually across dozens or hundreds of vendors creates bottlenecks. Security teams spend weeks chasing questionnaire responses, managing document versions in email, and building risk scores in spreadsheets.
Orbiq's Vendor Assurance Platform automates the entire workflow:
- Automated questionnaire distribution — send assessment packages to vendors in minutes
- AI-powered response analysis — flag gaps and inconsistencies without manual review
- Certificate monitoring — get alerted when vendor certifications are about to expire
- Centralized risk register — all assessments, scores, and decisions in one place
- Audit-ready documentation — NIS2 and DORA-compliant records generated automatically
For organizations managing more than 20 vendors, automation reduces assessment cycle time by 60–80% and eliminates the compliance risk of paper-based processes.
Further reading: