IronRoot Risk Consultants

Vendor Security Questionnaire

For use when evaluating vendors, suppliers, and service providers with access to your data or systems.


Vendor / Company Name:
Primary Contact Name & Title:
Contact Email & Phone:
Service / Product Provided:
Accesses, stores, or transmits your data?
[ ] Yes    [ ] No
Types of data involved:
[ ] PII   [ ] Financial   [ ] Health/PHI   [ ] PCI   [ ] Other: _______________
Questionnaire Completed By:
Date Completed:
Instructions for Vendors: Please answer each question honestly. Where a question does not apply to your organization, mark N/A and include a brief explanation in the Notes column. For Yes answers, be prepared to provide supporting documentation (policies, certifications, audit reports) upon request. Return completed questionnaire to chris@ironrootrisk.com.
1 — Security Program & Governance YesNoN/A Notes / Evidence Requested
Does your organization have a documented Information Security Policy?[ ][ ][ ]Request a copy or summary.
Have you conducted a cybersecurity risk assessment within the past 12 months?[ ][ ][ ]Request summary findings or attestation.
Do you have a named individual responsible for information security?[ ][ ][ ]Name and title.
Do you carry cyber liability insurance?[ ][ ][ ]Carrier name and coverage amount.
Do you have a documented Incident Response Plan?[ ][ ][ ]Request a copy or summary.
Have you experienced a data breach or security incident in the past 3 years?[ ][ ][ ]If yes, describe and explain remediation.
2 — Access Controls & Authentication YesNoN/A Notes / Evidence Requested
Is multi-factor authentication (MFA) required for remote access and admin accounts?[ ][ ][ ]Which systems require MFA?
Are access rights restricted to the minimum necessary (least privilege)?[ ][ ][ ]Describe access control model.
Is access reviewed and revoked promptly when employees leave?[ ][ ][ ]Describe offboarding process.
Are privileged accounts (admin/root) separate from standard user accounts?[ ][ ][ ]How many privileged accounts exist?
Are background checks conducted on employees with access to client data?[ ][ ][ ]Frequency and scope.
3 — Data Protection & Privacy YesNoN/A Notes / Evidence Requested
Is data encrypted at rest (stored) and in transit (transmitted)?[ ][ ][ ]Standards used (AES-256, TLS 1.2+)?
Do you have a documented data classification and handling policy?[ ][ ][ ]Request policy or summary.
Are backups of client data encrypted and stored securely off-site?[ ][ ][ ]Backup frequency and retention period.
Do you have a formal data retention and secure disposal policy?[ ][ ][ ]How is data deleted at end of relationship?
Are your systems and staff compliant with applicable privacy laws (GDPR, CCPA, HIPAA)?[ ][ ][ ]Which laws apply? Documentation available?
Will you notify us within 72 hours of a breach affecting our data?[ ][ ][ ]Reference your incident notification SLA.
4 — Network & Endpoint Security YesNoN/A Notes / Evidence Requested
Are systems patched and updated on a regular, documented schedule?[ ][ ][ ]Patch SLA for critical vulnerabilities?
Is endpoint protection (antivirus/EDR) deployed on all systems accessing client data?[ ][ ][ ]Solution name.
Are vulnerability scans or penetration tests conducted at least annually?[ ][ ][ ]Most recent test date and findings summary.
Is your network segmented to limit access to sensitive data?[ ][ ][ ]Describe segmentation approach.
Are remote access sessions encrypted and logged?[ ][ ][ ]VPN / Zero Trust solution in use?
5 — Third Parties, Subcontractors & Certifications YesNoN/A Notes / Evidence Requested
Do you use subcontractors or sub-processors who will access our data?[ ][ ][ ]List all subcontractors with data access.
Are your subcontractors subject to the same security requirements as your organization?[ ][ ][ ]How is compliance verified?
Do you have a SOC 2 Type II report, ISO 27001 certification, or equivalent?[ ][ ][ ]Provide most recent report / certificate.
Have you undergone a third-party security audit in the past 24 months?[ ][ ][ ]Auditor name and date.
Are all employees who handle client data security awareness trained annually?[ ][ ][ ]Training program and frequency.

Reviewer Notes & Risk Decision

Overall Assessment:
[ ] Approved    [ ] Approved with Conditions    [ ] Rejected    [ ] Pending Follow-Up
Key Concerns Identified:
Follow-Up Items Required:
Risk Tier Assigned:
[ ] Low    [ ] Medium    [ ] High    [ ] Critical
Reviewed By:
Review Date:
Next Review Date:

Need help evaluating vendor responses?

IronRoot Risk Consultants can review completed questionnaires, score vendor risk, and recommend contract terms to protect your business.

chris@ironrootrisk.com  |  ironrootrisk.com