The average 150-person SaaS company uses 43 distinct software tools. Each one is a potential vector for a data breach, a compliance gap, or a supply chain incident. Your SOC 2 and ISO 27001 programs require you to have a vendor risk management program that covers all of them. Most companies have a vendor risk program that covers about six.

The gap between "we have a vendor risk policy" and "our vendor risk program actually addresses our real risk exposure" is where most compliance programs fail. Here's how to close it without building a bureaucracy that collapses under its own weight.

Start With the Right Inventory

The precondition for any vendor risk program is knowing what vendors you actually have. This sounds obvious and is routinely wrong. Most companies maintain a "vendor list" that was last updated eight months ago, doesn't include tools that individual team members procured on a company credit card, and doesn't distinguish between vendors that touch personal data and vendors that don't.

A real vendor inventory requires input from finance (AP records and corporate card spend), IT (SSO integration list, MDM-enrolled apps), legal (contracts), and department heads (tools the finance team is using that IT doesn't know about). Expect to find 20–30% more tools than your current list shows. This is normal and not a crisis — you just need an accurate picture before you can prioritize.

Your inventory needs, at minimum: vendor name, vendor category, data accessed (personal data vs. non-personal), business criticality, contractual relationship (DPA in place y/n), current certification status.

Risk-Tier Your Vendor List

Not all vendors deserve the same scrutiny. Sending a 150-question security questionnaire to your expense management tool is not a proportionate use of anyone's time. A risk-tiering approach lets you concentrate review effort where it matters.

A three-tier model works for most companies:

Tier 1 (High Risk): Vendors that process personal data, have administrative access to your systems, or are business-critical. Expect 5–10 vendors here. These require full due diligence: security questionnaire or equivalent, current audit report (SOC 2 or ISO 27001), DPA, and annual review.

Tier 2 (Moderate Risk): Vendors that have access to your internal data but not personal data, or that have limited business criticality. Expect 10–20 vendors here. These require a SOC 2 report or equivalent certification, DPA if personal data is involved, and annual review triggered by renewal.

Tier 3 (Low Risk): Vendors that don't access your data, have no system integration, or are purely operational tools with no security relevance. Simplified assessment: verify they have a reasonable security policy publicly accessible, DPA if needed, and biennial review.

For a 40-tool stack, this typically means deep-diving 8–12 vendors, lighter review of 15–18, and minimal review of the rest. That's manageable. Reviewing 40 vendors uniformly is not.

The Security Questionnaire Trap

Security questionnaires are the standard vendor risk assessment tool and also the most inefficient one in common use. Sending a 150-question CAIQ or SIG questionnaire to every vendor means:

  • Waiting 4–8 weeks for responses (if you get them at all)
  • Receiving responses that are often filled in by the vendor's sales team, not their security team
  • Having to review 150 answers per vendor, many of which are irrelevant to your actual risk concerns

The better approach for Tier 1 and 2 vendors: request their current SOC 2 Type II report or ISO 27001 certificate, review it yourself, and use a short (15–20 question) targeted questionnaire for gaps the report doesn't cover. For most SaaS vendors, their SOC 2 report already answers 80% of your questions. The questionnaire fills in the other 20%.

For vendors that don't have a current SOC 2 report, that itself is a finding. A SaaS company processing your customer personal data without a current audit certification is a material risk, and you should document it as such and escalate to management for a risk acceptance decision.

Continuous Vendor Monitoring

SOC 2 (CC9.2) and ISO 27001 (5.19–5.22) don't just require due diligence at vendor onboarding. They require ongoing monitoring throughout the vendor relationship. In practice, this means:

  • Tracking when vendor certifications expire and pulling updated reports before expiration
  • Monitoring public breach disclosures and security advisories for your key vendors
  • Annual re-assessment for Tier 1 vendors
  • Change-triggered assessment when a vendor makes material changes to their security posture, ownership, or data processing

The most common gap here is certification expiry monitoring. SOC 2 Type II reports have a validity period — typically 12 months. A vendor's report from January 2024 is not a current assessment of their controls in February 2026. If you're relying on stale audit reports, your vendor risk program isn't providing the assurance it appears to provide.

Sub-Processor Management Under GDPR

For companies with EU customers, vendor risk management has an additional dimension: GDPR sub-processor obligations. If you're a data processor for your EU customers, you must notify those customers of your sub-processors and get authorization (general or specific) for sub-processing. Your DPA with your customers typically covers this, but it requires you to maintain an accurate sub-processor list and have a process for notifying customers of changes.

In practice, most companies have never mapped which of their 40+ tools actually qualify as sub-processors — vendors that process EU personal data you hold as a processor. Build this map. It's typically 8–15 tools for a standard SaaS company. Those vendors need DPAs, valid transfer mechanisms, and should appear in your sub-processor list.

Making It Sustainable

Vendor risk programs die when they become too burdensome to maintain. The way to make it sustainable: automate the repeatable parts. Certification expiry tracking, vendor inventory maintenance, questionnaire distribution and tracking — these are well-suited to automation. The judgment calls (does this vendor's security posture justify the risk?) need human review. The paperwork and scheduling don't.

RegaLoop tracks vendor certifications and automates your sub-processor register automatically.

Keep your vendor risk program current without the manual overhead.

Book a Demo