Third-Party Vendor Risk Assessment: Practical Guide + Free Template (2026)
2026-03-23
By Orbiq Team

Third-Party Vendor Risk Assessment: Practical Guide + Free Template (2026)

Learn how to conduct a third-party vendor risk assessment step by step. Covers what to assess, how to score risk, NIS2 and DORA requirements, and a free assessment template.

vendor-risk
third-party-risk
risk-assessment
nis2
dora
iso-27001

Third-Party Vendor Risk Assessment: Practical Guide + Free Template (2026)

A third-party vendor risk assessment is the structured process that determines whether a vendor can be trusted with your data, systems, or services — and what controls you need to verify before you sign the contract. This guide explains how to run an assessment from start to finish, what to look for at each stage, and how to score risk consistently across your vendor portfolio.

The framework aligns with ISO 27001:2022 (Annex A 5.19–5.21), NIS2 Article 21(2)(d), and DORA Articles 28–30.


Why Third-Party Risk Assessment Matters

Your security posture is only as strong as your weakest vendor. According to the Verizon 2024 Data Breach Investigations Report, 15% of all breaches involved a third party — and third-party breaches are growing faster than direct attacks. Regulators have taken notice.

The core problem: most organizations still run vendor assessments as one-off events at onboarding, then file the results and never revisit them. A vendor that passed a 2022 assessment may look very different in 2026 — new sub-processors, acquired by a different owner, or operating on infrastructure with known vulnerabilities.

Effective third-party risk assessment is:

  • Proportionate — critical vendors get full assessments; low-risk vendors get lightweight checklists
  • Evidence-based — certifications and audit reports, not just questionnaire responses
  • Continuous — ongoing monitoring, not just point-in-time snapshots
  • Documented — auditors and regulators expect written records

Step 1: Classify the Vendor Before You Assess

Before applying any template, determine how deep an assessment is warranted. Applying the same 80-question questionnaire to both your coffee machine vendor and your cloud infrastructure provider wastes time on both ends.

Inherent Risk Factors

Score each factor on a 1–4 scale (Low / Medium / High / Critical):

FactorLow (1)Medium (2)High (3)Critical (4)
Data sensitivityPublic data onlyInternal dataConfidential/personal dataSpecial category / regulated data
Data volumeNoneLimitedModerateLarge scale
System accessNo accessRead-only accessWrite accessAdmin / privileged access
Service criticalityNice-to-haveOperational supportBusiness-importantMission-critical

Tier assignment based on total score:

  • 4–7: Tier 3 — lightweight assessment (20–30 item checklist)
  • 8–11: Tier 2 — standard assessment (40–60 questions + document review)
  • 12–16: Tier 1 — full assessment (80+ questions + document review + site visit or third-party audit)

Step 2: Send the Assessment Questionnaire

The questionnaire captures the vendor's self-reported controls. It is one input to the assessment — not the assessment itself.

Core Questionnaire Domains

Domain 1: Information Security Controls

  • Do you have a documented information security policy reviewed within the last 12 months?
  • What access control mechanisms are in place for systems handling our data?
  • Describe your encryption standards for data at rest and in transit.
  • How are privileged accounts managed and monitored?
  • What is your patch management cycle for critical vulnerabilities?
  • Describe your incident detection and response capabilities.
  • Do you conduct penetration testing? How frequently, and by whom?

Domain 2: Compliance and Certifications

  • Which certifications do you currently hold? (ISO 27001, SOC 2 Type II, ISO 27701, PCI-DSS, etc.)
  • Provide the most recent certificate with validity dates.
  • Are you subject to NIS2 or DORA requirements? What is your compliance status?
  • When was your last external audit? Provide a summary or executive report.

Domain 3: Data Handling and Privacy

  • In which countries is our data stored and processed?
  • Provide a complete list of sub-processors accessing our data.
  • What are your data retention and deletion procedures?
  • Describe your data breach notification process and timeline.
  • Do you conduct DPIAs for high-risk processing activities?

Domain 4: Business Continuity

  • What is your Recovery Time Objective (RTO) for a full service outage?
  • What is your Recovery Point Objective (RPO)?
  • When was your last BCP/DR test? Provide results summary.
  • Do you have geographic redundancy for systems handling our data?

Domain 5: Financial and Operational Stability

  • Provide your most recent audited financial statements or equivalent evidence.
  • Do you carry cyber liability insurance? What is the coverage amount?
  • Describe key person dependencies in your security function.

Domain 6: Sub-contractor and Supply Chain Risk

  • List all sub-contractors with access to our data or systems.
  • Describe how you assess and monitor your own sub-contractors.
  • Do you have a right to audit clause in sub-contractor agreements?

Step 3: Review Evidence Documents

Questionnaire responses require verification. A vendor claiming ISO 27001 certification means nothing without the certificate. Request and review these documents:

ClaimRequired Evidence
ISO 27001 certifiedCurrent certificate from accredited body (check expiry + scope)
SOC 2 Type IIFull SOC 2 report (not just the summary letter)
Penetration testedExecutive summary from independent tester + remediation log
GDPR compliantDPA template, sub-processor list, data transfer mechanism
BCP/DR testedTest report with date, scenario, and results
Financially stableAnnual report or audited accounts (recent)

Red flags during document review:

  • ISO 27001 certificate scope excludes the systems that will handle your data
  • SOC 2 report is Type I (not Type II) — this tests design only, not operating effectiveness
  • Pen test was conducted more than 18 months ago with no follow-up
  • Certificate is from an unknown or non-accredited body
  • Sub-processor list is incomplete or unavailable ("confidential")

Step 4: Score the Risk

Combine inherent risk (Step 1) with control effectiveness to calculate residual risk.

Control Effectiveness Rating

After reviewing questionnaire responses and documents, rate the vendor's controls:

  • Strong — certified, recently audited, evidence matches claims, no material findings
  • Adequate — certified or audited, minor gaps identified, remediation plan in place
  • Weak — self-reported only, gaps identified, no evidence of remediation
  • Insufficient — no certifications, audit report unavailable, significant gaps

Residual Risk Matrix

Inherent RiskStrong ControlsAdequate ControlsWeak ControlsInsufficient Controls
LowLowLowMediumMedium
MediumLowMediumMediumHigh
HighMediumHighHighCritical
CriticalHighHighCriticalCritical

Decision by Residual Risk

Residual RiskDecisionRequirements
LowAuto-approveStandard contract + DPA
MediumApprove with conditionsAdditional contract clauses, remediation timeline
HighLeadership sign-off requiredRisk acceptance sign-off + enhanced monitoring
CriticalReject or escalateVendor must remediate before approval, or find alternative

Step 5: Document the Assessment

Every assessment must produce a written record. Regulators under NIS2 and DORA require organizations to demonstrate supply chain risk management — which means documentation, not just good intentions.

Assessment record must include:

  • Vendor name, classification, and services in scope
  • Assessment date and assessor
  • Questionnaire version used
  • Evidence documents reviewed (with dates)
  • Risk scores: inherent risk, control effectiveness, residual risk
  • Approval decision and approver name
  • Any conditions, remediation requirements, or risk acceptances
  • Next scheduled review date

Store assessments in a centralized system accessible to your compliance and legal teams, not in individual email threads or spreadsheets.


NIS2 and DORA Requirements for Third-Party Assessments

NIS2 (Article 21(2)(d))

NIS2-affected organizations must implement risk management measures addressing supply chain security. This means:

  • Pre-engagement assessment — documented before onboarding critical vendors
  • Contractual security requirements — minimum security standards written into contracts
  • Ongoing monitoring — not just point-in-time; continuous monitoring of critical suppliers
  • Incident notification — vendors must notify you of relevant security incidents

The NIS2 competent authorities have indicated they expect organizations to maintain a documented vendor inventory with risk classifications.

DORA (Articles 28–30)

Financial entities under DORA face stricter requirements for ICT third-party risk:

  • Pre-contract risk assessment required for all ICT providers
  • Concentration risk assessment — evaluate whether you are over-dependent on a single provider
  • Exit strategy — document how you would exit the relationship if the vendor fails
  • Right to audit — contracts must include audit rights for the entity and regulators
  • Critical ICT providers — enhanced due diligence and EBA/ESA notification requirements

Ongoing Monitoring After Assessment

Approval is not the end of the process — it is the beginning. Vendor risk changes continuously.

Monitoring activities by vendor tier:

ActivityTier 1 (Critical)Tier 2 (Standard)Tier 3 (Low-risk)
Re-assessmentAnnual18–24 months3 years or contract renewal
Certificate monitoringContinuousOn renewalOn renewal
Security news monitoringContinuousQuarterlyAs needed
Incident notification reviewAny incidentMaterial incidentsCritical incidents only
Sub-processor change reviewAll changesMaterial changesNot required

Trigger events that require immediate re-assessment regardless of schedule:

  • Vendor reports a security incident affecting your data
  • Vendor is acquired by a new owner
  • Significant change to the services or infrastructure in scope
  • Vendor loses a key certification
  • Media reports of breach, financial distress, or regulatory action

Common Mistakes to Avoid

Treating questionnaires as assessments. A questionnaire captures what the vendor claims. Without document review and independent verification, you have no basis for a risk decision.

Applying one tier to all vendors. Over-assessing low-risk vendors wastes time and reduces vendor cooperation. Under-assessing critical vendors creates blind spots.

Skipping sub-processor review. Your risk does not stop at your direct vendor. If they use sub-processors with weaker controls, those become your risk too.

Approving without conditions. Medium and high residual risk vendors can be approved — but only with documented conditions: remediation timelines, enhanced contract clauses, or additional monitoring.

No re-assessment trigger. Schedule-based re-assessment alone misses the most dangerous moments: post-acquisition, post-incident, and post-scope change.


Third-Party Vendor Risk Assessment Template

Use this summary checklist as your assessment record. For the full 80-question questionnaire by domain, refer to the Vendor Risk Assessment Template.

Pre-Assessment

  • Vendor classified (Tier 1 / 2 / 3)
  • Inherent risk scored (data sensitivity, volume, access, criticality)
  • Assessment tier confirmed with risk owner

Questionnaire and Document Review

  • Questionnaire sent and returned
  • ISO 27001 / SOC 2 certificate reviewed (scope and expiry verified)
  • Penetration test report reviewed (date + remediation status)
  • Sub-processor list obtained
  • DPA reviewed (data location, retention, deletion)
  • BCP/DR test report reviewed
  • Financial stability evidence obtained

Scoring and Decision

  • Control effectiveness rated (Strong / Adequate / Weak / Insufficient)
  • Residual risk calculated
  • Approval decision documented
  • Conditions or remediation requirements recorded
  • Risk acceptance signed (if High residual risk)
  • Assessment record stored in vendor register

Post-Approval

  • DPA and security contract clauses signed
  • Monitoring frequency set
  • Next re-assessment date calendared
  • Incident notification workflow confirmed with vendor

How Orbiq Automates Vendor Risk Assessments

Running this process manually across dozens or hundreds of vendors creates bottlenecks. Security teams spend weeks chasing questionnaire responses, managing document versions in email, and building risk scores in spreadsheets.

Orbiq's Vendor Assurance Platform automates the entire workflow:

  • Automated questionnaire distribution — send assessment packages to vendors in minutes
  • AI-powered response analysis — flag gaps and inconsistencies without manual review
  • Certificate monitoring — get alerted when vendor certifications are about to expire
  • Centralized risk register — all assessments, scores, and decisions in one place
  • Audit-ready documentation — NIS2 and DORA-compliant records generated automatically

For organizations managing more than 20 vendors, automation reduces assessment cycle time by 60–80% and eliminates the compliance risk of paper-based processes.

Further reading:

Third-Party Vendor Risk Assessment: Practical Guide + Free Template (2026) | Vendor Risk Management | Orbiq