Vendor Risk Management for Startups: Stop Using Spreadsheets
The average SaaS startup uses 80-120 third-party tools. Each one is a potential security risk, and your SOC 2 or ISO 27001 auditor is going to ask you how you manage that risk.
If your answer is "we have a Google Sheet somewhere," this post is for you.
Why Vendor Risk Management Matters
Your security is only as strong as your weakest vendor. When a third party gets breached, your data goes with it. Recent examples:
- MOVEit (2023): File transfer vendor breach affected 2,000+ organizations
- Okta (2023-2024): Identity provider breach impacted customers who trusted Okta with authentication
- Codecov (2021): CI/CD tool compromised, exposing customer secrets
From a compliance perspective, every framework requires vendor oversight:
| Framework | Requirement | What Auditors Want |
|---|---|---|
| SOC 2 | CC9.2 - Risk management of third parties | Vendor inventory, assessments, contracts |
| ISO 27001 | A.5.19-A.5.22 - Supplier relationships | Supplier security policy, monitoring, changes |
| HIPAA | §164.308(b)(1) - Business Associate contracts | BAAs with all vendors handling PHI |
| PCI DSS | Req 12.8 - Service provider management | List of providers, written agreements, monitoring |
Building a Vendor Risk Programme (Without Going Crazy)
Step 1: Create Your Vendor Inventory
You can't manage risk for vendors you don't know about. Start with a complete inventory.
How to find all your vendors:
- Check your finance tools: Expense reports, credit card statements, procurement systems
- Audit SSO/IdP: Every app connected to Okta, Google Workspace, or Azure AD
- Check DNS: What third-party domains do your apps connect to?
- Ask engineering: What SaaS tools, APIs, and libraries do they use?
- Review browser extensions: Often overlooked but can access sensitive data
What to capture for each vendor:
| Field | Example |
|---|---|
| Vendor name | Datadog |
| Category | Monitoring |
| Data shared | Application logs, infrastructure metrics |
| Data classification | Confidential |
| Contract owner | CTO |
| Contract renewal date | 2026-12-01 |
| SOC 2 report available? | Yes - Type II, dated 2025-09-15 |
| BAA signed? (if HIPAA) | N/A |
| Last risk assessment | 2026-01-15 |
| Risk tier | Medium |
Step 2: Tier Your Vendors
Not every vendor needs the same level of scrutiny. Tier them based on:
- What data do they access? (None, public, internal, confidential, regulated)
- How critical are they to operations? (Nice-to-have vs. can't operate without)
- What access do they have? (Read-only, read-write, admin)
Tier definitions:
| Tier | Criteria | Assessment Required | Review Frequency |
|---|---|---|---|
| Critical | Handles sensitive data AND critical to operations | Full security assessment + SOC 2 review | Annually |
| High | Handles sensitive data OR critical to operations | Security questionnaire + SOC 2 review | Annually |
| Medium | Handles internal data, not critical | Simplified questionnaire | Every 2 years |
| Low | No data access, not critical | Self-attestation only | Every 3 years |
Example tiering:
- Critical: AWS (infrastructure), Stripe (payment data), Okta (authentication)
- High: GitHub (source code), Datadog (logs), Snowflake (analytics data)
- Medium: Slack (internal comms), Notion (documentation), Figma (design)
- Low: Calendly (scheduling), Loom (video recording)
Step 3: Assess Your Critical Vendors
For Critical and High-tier vendors, you need a structured assessment:
Security documents to collect:
- SOC 2 Type II report (or ISO 27001 certificate)
- Pentest summary (last 12 months)
- Privacy policy and DPA (Data Processing Agreement)
- Incident response procedures
- Business continuity plan
- Sub-processor list (who are THEY sharing your data with?)
Key questions for your security questionnaire:
DATA SECURITY
□ How is data encrypted at rest and in transit?
□ What encryption algorithms and key lengths are used?
□ Who has access to customer data? How is it controlled?
□ Can you provide data residency guarantees?
ACCESS CONTROL
□ Do you enforce MFA for all employees?
□ How do you handle employee offboarding?
□ Do you conduct background checks?
□ How is privileged access managed?
INCIDENT RESPONSE
□ What is your breach notification timeline?
□ How will we be notified in case of an incident?
□ Can you provide incident response contact details?
□ What was the last security incident?
COMPLIANCE
□ Do you have a current SOC 2 Type II report?
□ Are you ISO 27001 certified?
□ Do you conduct annual penetration tests?
□ What compliance frameworks do you adhere to?
Step 4: Review SOC 2 Reports (The Right Way)
When a vendor sends you their SOC 2 report, don't just confirm it exists. Actually read these sections:
Section IV: Description of the System
- Does the scope cover the services you use?
- Are the trust service criteria relevant to your needs?
Section V: Testing and Results (the auditor's opinion)
- Are there any qualified opinions? (This means the auditor found issues)
- Are there exceptions noted? (Controls that failed testing)
Complementary User Entity Controls (CUECs)
- These are controls YOU need to implement for the vendor's controls to work
- Example: "User entity is responsible for managing their own authentication credentials"
- Your auditor will ask if you're implementing these
Sub-service organizations
- Does the vendor rely on other vendors (like AWS)?
- Are those vendors included or carved out of the SOC 2 scope?
Step 5: Contractual Protections
Your vendor contracts should include:
- Security requirements: Minimum security standards the vendor must maintain
- Breach notification: 24-72 hour notification requirement
- Right to audit: Your right to assess the vendor's security
- Data handling: Encryption, retention, and deletion requirements
- Sub-processor notification: Require notice when they add new sub-processors
- Termination data handling: What happens to your data when the contract ends
For HIPAA-regulated vendors, you also need a Business Associate Agreement covering specific HIPAA requirements.
Automating Vendor Risk Management
Manual vendor management doesn't scale. Here's how to automate:
Intake Automation
- Auto-classify new vendors based on data access and criticality
- Trigger the appropriate assessment workflow based on tier
- Pull SOC 2 report availability from public trust centers
Continuous Monitoring
- Monitor vendor security ratings (SecurityScorecard, BitSight)
- Alert on vendor breaches or security incidents
- Track SOC 2 report expiration dates
- Monitor vendor financial health
Evidence Collection
When it's time for your own SOC 2 audit, you need evidence that your vendor risk programme is working. With Proveably, we automatically collect and organize:
- Vendor inventory with risk tiers
- Assessment completion dates
- SOC 2 report coverage periods
- Contract requirement tracking
- Automated evidence mapped to SOC 2 CC9.2
Common Vendor Risk Mistakes
1. Treating all vendors the same Don't send a 200-question security questionnaire to every vendor. Tier them and right-size your assessments.
2. Collecting SOC 2 reports but not reading them A SOC 2 report with qualified opinions or numerous exceptions is worse than no report. Actually review the findings.
3. Ignoring vendor changes When a vendor changes their sub-processors, updates their terms, or gets acquired — reassess. Don't wait for your annual review cycle.
4. Forgetting about shadow IT Engineers signing up for free trials with work email creates untracked vendor relationships. Monitor SSO and DNS to catch these.
5. No offboarding process When you stop using a vendor, ensure they delete your data. Get written confirmation and add it to your compliance evidence.
Vendor Risk Metrics for Your Board
Your leadership team needs a vendor risk dashboard:
- Total vendors: Tracked (number) vs. untracked (target: 0)
- Assessment coverage: % of Critical/High vendors with current assessments
- SOC 2 coverage: % of Critical vendors with valid SOC 2 reports
- Open risks: Number of accepted risks and their total risk score
- Overdue assessments: Vendors past their reassessment date
- Recent changes: New vendors added, vendor incidents reported
Build your vendor risk programme in days, not months. Proveably automates vendor inventory management, tracks SOC 2 report coverage, and maps your vendor oversight directly to SOC 2 and ISO 27001 requirements. Start free — your auditor will thank you.