Vendor Risk Assessment Template: Free Checklist for 2026
2026-03-17
By Orbiq Team

Vendor Risk Assessment Template: Free Checklist for 2026

Free vendor risk assessment template with a complete checklist for security, compliance, data handling, and business continuity — covering ISO 27001, NIS2, and DORA requirements.

vendor-risk
template
third-party-risk
iso-27001
nis2
dora

Vendor Risk Assessment Template: Free Checklist for 2026

A vendor risk assessment is the structured process that determines whether a third party can be trusted with your data, systems, or services — and under what conditions. This page provides a complete, ready-to-use vendor risk assessment template covering all six evaluation domains, a scoring framework, and guidance on when and how to use it.

The template is designed to meet the requirements of ISO 27001 (Annex A 5.19–5.21), NIS2 (Article 21(2)(d)), and DORA (Articles 28–30).


Why a Structured Template Matters

Ad-hoc vendor assessments produce inconsistent results: the same vendor assessed by two team members may receive entirely different risk ratings. A standardized template ensures:

  • Consistency — every vendor is evaluated against the same criteria
  • Defensibility — documented assessments satisfy auditors and regulators
  • Scalability — repeatable processes can be delegated and automated
  • Comparability — structured data lets you compare vendor risk profiles over time

According to Bitsight's 2025 third-party risk report, only one in three organizations continuously monitor all third-party relationships for cyber risk [1]. The majority rely on point-in-time assessments — making a rigorous template the baseline minimum.


Before You Start: Classify the Vendor

Before applying the full template, classify the vendor to determine assessment depth. This prevents over-assessing low-risk vendors and under-assessing critical ones.

Inherent Risk Classification

FactorLowMediumHighCritical
Data sensitivityPublic data onlyInternal dataConfidential dataRegulated personal data
Data volumeMinimalModerateSignificantLarge-scale processing
System accessNo direct accessRead-onlyRead-writeAdministrative/privileged
Service criticalityNice-to-haveSupportingImportantBusiness-critical / essential
ReplaceabilityEasy to switchSome effortDifficultHigh lock-in

Overall inherent risk rating: Low / Medium / High / Critical

Assessment Tier

Inherent RiskAssessment TierTemplate Sections Required
CriticalTier 1 — FullAll six sections + independent verification
HighTier 1 — FullAll six sections
MediumTier 2 — StandardSections 1–4
LowTier 3 — LightweightSection 1 summary + Section 2

The Template

Section 1: Information Security Controls

Rate each control area: ✅ Verified / ⚠️ Partial / self-attested / ❌ Not in place / N/A

1.1 Access Management

ControlStatusNotes / Evidence
Multi-factor authentication enforced for all accounts
Role-based access control (RBAC) implemented
Privileged access management (PAM) in place
Access reviews conducted (at least annually)
Joiners/movers/leavers process documented
Customer data access limited to need-to-know

1.2 Encryption

ControlStatusNotes / Evidence
Data encrypted at rest (AES-256 or equivalent)
Data encrypted in transit (TLS 1.2+ enforced)
Encryption key management process documented
Customer-controlled encryption keys available

1.3 Vulnerability Management

ControlStatusNotes / Evidence
Regular vulnerability scanning performed
Critical patches applied within defined SLA
Penetration test conducted within last 12 months
Pen test results and remediation available
Responsible disclosure / bug bounty program

1.4 Incident Response

ControlStatusNotes / Evidence
Documented incident response plan
Security incident notification SLA defined
Customer notification process for data breaches
Post-incident review process in place
Security operations / monitoring capability

1.5 Network and Infrastructure Security

ControlStatusNotes / Evidence
Network segmentation implemented
Firewall and intrusion detection systems
DDoS protection in place
Audit logs retained (minimum 12 months)
Change management process documented

Section 1 Summary:

  • Controls verified: ___ / 24
  • Critical gaps identified: ___
  • Control effectiveness rating: Strong / Adequate / Weak / Insufficient

Section 2: Compliance and Certifications

Certification / FrameworkStatusExpiry / Last AuditReport Available?
ISO 27001:2022Certified / In progress / No
SOC 2 Type IICompleted / In progress / No
ISO 27701 (Privacy)Certified / No
GDPR complianceDocumented / Partial / No
NIS2 compliance measuresImplemented / Partial / No
DORA compliance (if financial sector)Implemented / Partial / No
Penetration test (last 12 months)Yes / No
Bug bounty / responsible disclosureActive / No

Certification verification: Have you independently verified certificate validity (e.g., via IAF CertSearch for ISO 27001)? ☐ Yes ☐ No

Section 2 Summary:

  • Certifications verified: ___
  • Key compliance gaps: ___

Section 3: Data Handling

QuestionResponseNotes
What data types will the vendor access or process?
Where is data stored and processed? (countries/regions)
Is data stored within the EU/EEA?Yes / No / Partially
Does the vendor use sub-processors?Yes / No
Sub-processor list available?Yes / No
Notification process for sub-processor changes?Yes / No
Data retention period defined?Yes / No — ___ days
Secure deletion process documented?Yes / No
Data portability/export capability?Yes / No
Data Processing Agreement (DPA) in place?Yes / No

Section 3 Summary:

  • Data residency compliant (EU): ☐ Yes ☐ No ☐ Partial
  • DPA signed: ☐ Yes ☐ No
  • Sub-processor risk: ☐ Low ☐ Medium ☐ High

Section 4: Business Continuity

QuestionResponseNotes
Recovery Time Objective (RTO)Hours
Recovery Point Objective (RPO)Hours
Business Continuity Plan documented?Yes / No
Disaster recovery test conducted (last 12 months)?Yes / No
Backup frequency and geographic distribution
Uptime SLA%
SLA breach remedy defined?Yes / No
Exit/transition assistance process?Yes / No
Data migration support at contract end?Yes / No

Section 4 Summary:

  • RTO/RPO acceptable for criticality: ☐ Yes ☐ No
  • Business continuity rating: Strong / Adequate / Weak / Insufficient

Section 5: Financial and Operational Stability

(Tier 1 assessments only)

QuestionResponseNotes
Company ageYears
Approximate revenue / funding stage
Cyber liability insurance in place?Yes / No
Insurance coverage amountEUR/USD
Key person dependencies identified?Yes / No
Customer concentration risk(e.g., single customer >30% of revenue?)
Relevant litigation / regulatory sanctionsNone / Yes

Section 5 Summary:

  • Financial stability risk: ☐ Low ☐ Medium ☐ High

Section 6: Subcontractor and Supply Chain Risk

(Tier 1 assessments only)

QuestionResponseNotes
Does the vendor use critical ICT sub-processors?Yes / No
Sub-processor assessment process documented?Yes / No
Security requirements flow down to sub-processors?Yes / No
Critical sub-processors identifiable in event of incident?Yes / No
Sub-processor concentration risk assessed?Yes / No

Section 6 Summary:

  • Supply chain risk: ☐ Low ☐ Medium ☐ High

Risk Scoring: Calculating Residual Risk

Once all sections are complete, calculate the residual risk rating.

Step 1: Inherent Risk (from Classification above)

Low / Medium / High / Critical

Step 2: Control Effectiveness

Based on Section 1 and Section 2 findings:

  • Strong — ISO 27001 or SOC 2 Type II certified, clean audit, all critical controls verified
  • Adequate — Most controls in place, some certification, minor gaps
  • Weak — Basic controls only, limited evidence, significant gaps in one or more areas
  • Insufficient — Material control failures, no certification, unresponsive to requests

Step 3: Residual Risk Matrix

Strong ControlsAdequate ControlsWeak ControlsInsufficient Controls
Critical inherentHighHighCriticalCritical
High inherentMediumHighHighCritical
Medium inherentLowMediumHighHigh
Low inherentLowLowMediumHigh

Residual risk rating: Low / Medium / High / Critical

Step 4: Required Actions

Residual RiskApproval RequiredAdditional ControlsMonitoring Frequency
LowTeam LeadNone requiredAnnual
MediumSecurity ManagerMay be requiredEvery 6 months
HighCISO / Senior ManagementRequired — document controlsQuarterly
CriticalBoard / ExecutiveMandatory or decline vendorContinuous

Completing the Assessment

Assessment Summary

FieldDetail
Vendor name
Assessment date
Assessor name/role
Assessment tier (1/2/3)
Inherent risk rating
Control effectiveness rating
Residual risk rating
Risk decision☐ Approve ☐ Approve with conditions ☐ Decline
Conditions / required controls
Next review date
Approver name / role
Approver sign-off date

Documentation Checklist

Before filing the assessment, confirm you have:

  • ☐ Completed security questionnaire (vendor-provided)
  • ☐ ISO 27001 certificate (independently verified) or SOC 2 Type II report
  • ☐ Data Processing Agreement signed
  • ☐ Sub-processor list obtained
  • ☐ Risk scoring completed and signed off
  • ☐ Conditions / remediation actions documented
  • ☐ Next review date set in calendar

Mapping to Regulatory Requirements

ISO 27001:2022

ControlTemplate Coverage
5.19 — Information security in supplier relationshipsFull template — establishes what to evaluate
5.20 — Addressing information security within supplier agreementsSection 3 (DPA), Section 4 (SLA), Section 6 (flow-down)
5.21 — Managing information security in the ICT supply chainSection 6 (sub-processors), ongoing monitoring

Auditors will look for: completed assessment records, evidence of certification verification, documented risk decisions, and periodic re-assessment dates.

NIS2 Article 21(2)(d)

NIS2 requires essential and important entities to implement supply chain security measures, including assessment of direct suppliers' security practices and vulnerabilities. Sections 1, 2, and 6 of this template directly address these requirements.

DORA Articles 28–30

DORA requires financial entities to conduct pre-contractual risk assessments of ICT third-party service providers before entering critical contracts. The full Tier 1 template (all six sections) satisfies the DORA pre-contractual assessment requirement. Sections 3 and 4 address DORA's specific requirements around data location, audit rights, and exit strategies.


Automating Vendor Risk Assessments

Manual template-based assessments work at small scale. Once you're managing dozens of vendors, the process breaks down:

  • Questionnaire coordination becomes a project management burden
  • Evidence storage becomes fragmented across email and shared drives
  • Periodic re-assessment dates get missed
  • Audit preparation requires reconstructing paper trails

What automation addresses:

Manual Pain PointAutomated Solution
Sending and chasing questionnairesAutomated distribution and reminders
Storing certificates and audit reportsCentralized evidence repository
Risk scoring consistencyStandardized scoring engine
Tracking re-assessment due datesAutomated review scheduling
Preparing audit evidenceExportable assessment records
Monitoring between assessmentsContinuous certification and posture monitoring

Enterprise VRM platforms like UpGuard Vendor Risk (from ~$1,599/month for the Starter plan), Prevalent, and OneTrust TPRM (pricing varies widely; enterprise implementations typically range from $10,000–$40,000+/year depending on vendor volume and modules) offer full automation but carry significant cost and implementation complexity. They're designed for organizations managing hundreds or thousands of vendors [2].

For European companies managing a moderate vendor portfolio — where ISO 27001 certification, NIS2 compliance, and Trust Center visibility matter — a purpose-built compliance platform delivers the core assessment and monitoring capability without the overhead.


How Orbiq Supports Vendor Risk Assessment

Orbiq's vendor assurance platform streamlines both sides of vendor risk:

  • Outbound (your vendors): Distribute assessments, collect questionnaire responses, store certificates and audit reports, and track risk decisions in a centralized system. Automatic reminders replace manual follow-up.
  • Inbound (your customers' assessments of you): Publish your security posture, certifications, and compliance evidence in a Trust Center so customers can assess your risk without sending manual questionnaires.
  • Continuous monitoring: Track vendor certification status changes, breach notifications, and compliance gaps between formal assessment cycles.
  • EU data residency: All assessment data stays within the EU — a requirement for organizations subject to GDPR, NIS2, and DORA.

Related Resources


Sources & References

  1. Bitsight. (2025). Third-Party Risk Management Report. Bitsight Technologies. https://www.bitsight.com/resources/third-party-risk-management
  2. UpGuard. (2026). Vendor Risk Pricing. https://www.upguard.com/pricing — Prevalent TPRM pricing from vendor documentation; OneTrust enterprise pricing from analyst sources.

This template is maintained by the Orbiq team. Last updated: March 2026.

Vendor Risk Assessment Template: Free Checklist for 2026 | Vendor Risk Management | Orbiq