The Forrester Wave™: Cybersecurity Risk Ratings Platforms, Q2 2024
Vendor Risk Assessment Template
When you work with third parties, their risk is your risk. Common risks associated with vendors include everything from compliance risk to operational risk to financial and reputational loss. Vendor risk assessments can help your organization narrow down who to trust, and help you identify the level of risk you are taking on with your vendors.
Why is a vendor risk assessment template important?
Due to steadily increasing risks, organizations need to commit to due diligence when it comes to third-party vendors.
A recent study conducted by the Cyentia Institute and SecurityScorecard found that about 98% of organizations have a relationship with at least one third party that has experienced a breach in the last two years. In addition, 50% of organizations have indirect relationships with at least 200 fourth parties that have also had breaches in the last two years. According to IBM’s Cost of a Data Breach Report 2023, third-party breaches as the initial attack vector rose from $4.33 million USD in 2021 to $4.55 million USD in 2023.
And they aren’t slowing down anytime soon. In fact, Gartner predicts that 45% of organizations will have experienced attacks on their software supply chains by 2025.
While you can’t completely eliminate all vendor risk, you can manage it by assessing all the cybersecurity risks that come with each vendor as part of your due diligence process with a vendor risk assessment.
What should your vendor risk assessment template include?
You can’t completely eliminate all vendor risk, but you can manage it by assessing all the cybersecurity risks that come with each vendor as part of your due diligence process.
A vendor risk assessment is a tool that helps you understand how much risk you’ll take on when working with a specific vendor. Vendor risk assessments generally include the following steps.
Make a list of your vendors
Listing your organization’s vendors can be an intimidating process because organizations often don’t know who all their vendors are.
While it’s certainly important to list large vendors who handle core business functions — cloud service providers (CSPs), for example — smaller vendors also need to be cataloged. This can be complicated because departments often work with their own pool of vendors and may not have shared that information with other departments.
Daunting as the risk assessment process is, it’s important to get a picture of all the vendors your organization works with. Risk can come from any vendor, no matter their size and function.
Start classifying
Your vendor list is the first step toward classifying your vendors from highest risk to lowest risk based on the systems, networks, and data they access. For example, an Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) provider often stores customer data, proprietary information, and business critical software such as operating systems and databases. Meanwhile a point-of-sale (POS) systems vendor will have access to customer cardholder data (CD), and a payroll vendor will be able to access employee non-public personally identifiable information (PII).
Here are some questions to ask yourself as you classify your third parties:
- What does each vendor do?
- Who owns the vendor relationship?
- Which vendors are tied to your organization’s most critical business operations?
- Which vendors have access to protected information?
- Do those vendors need access to that information?
Calculate your risk
Not all vendors pose the same risks to your data. Vendors that handle critical business processes will be a bigger threat to your data than smaller contractors who may work with a single department.
You want to do a cybersecurity risk analysis for each vendor following the same formula you use for your organization. Using the identification and classification steps, you then use the following formula:
Risk = Likelihood of a Data Breach X Impact of a Data Breach/Cost
A cloud-based Electronic Medical Record (EMR) vendor, for example, may be responsible for handling a healthcare organization’s patient information records. A cyberattack on their servers would have a big impact, but it may also be extremely unlikely since healthcare is a highly regulated industry requiring strict, prescriptive controls under the Health Insurance Portability and Accountability Act (HIPAA). Meanwhile, a Software-as-a-Service (SaaS) vendor may use Amazon Web Services (AWS) and misconfigure the AWS S3 buckets leaving data stored there open to the public making a data breach more likely.
This is the tricky part of the vendor risk assessment process. You often lack the information necessary to determine the vendor’s likelihood of experiencing a data breach. For example, since you can’t control the vendor and review the vendor’s AWS configurations, you may not know that the vendor’s misconfiguration exists. In fact, often, the vendor won’t know.
In some cases, a vendor may have experienced a breach in the past, but unless the vendor is regulated and must report the breach, you don’t know this occurred. Even further, a vendor may have experienced a data incident that doesn’t rise to the level of a data breach, and therefore won’t need to be reported. In short, you often lack the information necessary to analyze the risk appropriately.
Assign a security risk rating
Once you analyze the risk a vendor poses, you set a risk rating of high, medium, or low. The vendors who handle the most business critical operations or the most sensitive data will likely be rated medium or high.
Vendors who do not interact with critical systems, networks, and data will be rated “low risk.”
Setting the risk rating allows you to prioritize your vendor risk monitoring strategies.
Using your assessments of your vendors and their associated threats, assign risk ratings to each vendor: low, medium or high.
Respond to your security risks
Once you understand the risks associated with each of your vendors, you can decide how to respond to them, by accepting, refusing, mitigating, or transferring the risk. If you choose to accept or mitigate risks associated with a vendor, you’ll then have to take action.
- Set controls for vendors: Encryptions, firewalls, and multi factor authorization are all examples of controls you and your vendors can put in place to protect your assets. An unchanged default password is a terrible way to suffer a breach, and easily preventable.
- Define your terms: If you’ve set internal controls, you need to make sure you and your vendors are using the same controls. Write your controls and your requirements into your agreements with vendors, so they know what’s expected of you.
- Monitor your vendors: Your work isn’t done when you set controls and get vendor buy-in. It’s your job to monitor your vendors continuously to ensure they don’t become lax and put your data at risk.
Vendor risk assessments with SecurityScorecard
Vendor controls aren’t a crockpot. You can’t just set them and forget them. Nor is it enough to monitor vendors using static monitoring techniques. Continuous monitoring is the best way to manage your third party relationships and ensure your data is consistently protected.
SecurityScorecard’s Security Questionnaires help you streamline your vendor risk assessment process and mature your vendor risk management program. Using our platform, organizations can upload vendor responses to questionnaires. SecurityScorecard’s machine learning compares those answers to previous vendor risk management questionnaires and the platform’s analytics, verifying vendor responses almost immediately.
SecurityScorecard also assigns security ratings for you. Our security ratings use an A-F scale across ten factors. As part of your vendor risk mitigation strategy, you can use these factors to set service level agreement (SLA) compliance requirements. Moreover, the easy-to-understand ratings scale enables you to provide your board of directors with the necessary documentation to prove governance over your vendor risk management program to meet increasingly stringent cybersecurity compliance requirements.