Skip to main content

Vendor Due Diligence & Assessment › Building a Vendor Risk Assessment Questionnaire

Building a Vendor Risk Assessment Questionnaire

The vendor risk assessment questionnaire (VRAQ) is the foundational tool your organisation uses to evaluate a vendor’s security posture before and during the relationship. A poorly designed questionnaire wastes time and produces unreliable data. A well-crafted one gives executives decision-grade intelligence about whether a vendor meets your risk tolerance. Building the right questionnaire requires balancing thoroughness with practicality.

Structuring an Effective Questionnaire

Leading questionnaire frameworks—SIG (Standardised Information Gathering), CAIQ (Consensus Assessments Initiative Questionnaire), and NIST CSF-based templates—organise questions into security domains. Your questionnaire should cover at minimum:

  • Data protection — encryption at rest and in transit, data classification, retention policies, and deletion procedures
  • Access management — authentication methods, role-based access controls, privileged-access management, and MFA enforcement
  • Incident response — documented IR plan, notification timelines, forensic capabilities, and communication protocols
  • Business continuity — disaster recovery plans, RTO/RPO targets, geographic redundancy, and testing frequency
  • Compliance and certifications — ISO 27001, SOC 2, PCI DSS, and any industry-specific standards
  • Human resources security — background checks, security awareness training, and acceptable-use policies
  • Subcontractor management — how the vendor assesses and monitors its own third parties

Diagram

Vendor Risk Assessment Questionnaire Domain Map

A structured grid showing seven assessment domains, each with three to five key question categories, organised by risk severity

Avoiding Common Pitfalls

The biggest mistake is creating a 300-question behemoth that vendors dread completing. Response quality degrades as fatigue sets in. Instead, tier your questionnaire: a short screening questionnaire for low-risk vendors (20-30 questions) and a comprehensive deep-dive for critical vendors (80-120 questions). Always require evidence—certifications, audit reports, policy documents—rather than accepting self-attestation alone.

Another pitfall is treating the questionnaire as a pass/fail exercise. Sophisticated organisations score responses on a weighted scale, flag residual risks, and use the results to negotiate contractual mitigations rather than simply rejecting vendors outright.

Action Steps

  1. Adopt or adapt an industry-standard framework (SIG Lite for screening, full SIG for critical vendors)
  2. Create tiered questionnaire versions aligned to your vendor criticality classifications
  3. Require documentary evidence for all critical security claims rather than self-attestation
  4. Implement a weighted scoring model that identifies residual risks for contractual negotiation

Quick Knowledge Check

  1. Why should vendor questionnaires be tiered rather than one-size-fits-all?
    Because excessively long questionnaires degrade response quality, and low-risk vendors do not warrant the same depth of assessment as critical vendors.
  2. What is the risk of relying solely on vendor self-attestation?
    Vendors may overstate their maturity. Documentary evidence such as audit reports and certifications provides independent verification of security claims.