๐Ÿ›ก๏ธ Vendor Risk

How to Evaluate Your
Security Vendor
Without Getting Burned

Choosing the wrong security vendor doesn't just cost you money, it can cost you your ISO 27001 certification, your SOC 2 audit, and in the worst cases, your customers' trust. Here is how to cut through the sales noise and make a decision you won't regret.

AH
Aditya Hadke
โœ๏ธ Project Delivery Leadยท๐Ÿ“– 7 min read
๐Ÿ“… March 2026ยท๐Ÿข SecComply
68%
Orgs hit by a vendor-caused security incident
4.3x
More likely to breach when due diligence skipped
$245K
Avg cost of a vendor-related incident
4%
Max GDPR fine as % of annual global turnover

Here is a scenario that plays out every week in companies of all sizes. A CISO gets 30 minutes with a vendor rep. The demo is slick. The pricing deck is surprisingly reasonable. Someone mentions a competitor is already using this tool. A purchase order is raised three weeks later. Six months on, the tool sits half-configured, the vendor's support team takes four days to respond to critical tickets, and the ISO 27001 auditor is asking pointed questions about a control gap the tool was supposed to close.

The problem is almost never the product itself. It is that the evaluation process was designed around the vendor's sales cycle rather than your actual security needs.

โ€œMost organisations evaluate security vendors the same way they'd buy software, based on features and price. That's the wrong framework entirely. You're not buying a feature set. You're entering a long-term risk relationship with a company that will have deep access to your most sensitive infrastructure.โ€

โ€” Aditya Hadke, Project Delivery Lead, SecComply
Security vendor due diligence meeting and contract review
Vendor evaluation done right means asking the questions vendors don't expect, the ones that surface actual risk rather than showcasing the product.

The Questions You Must Ask Before Any Demo

Before you ever sit through a demo, you should have a structured set of questions ready, not the questions vendors expect, but the ones that actually surface risk.

01
What data do you access, store, and process, and where does it live?
This sounds obvious but vendors routinely underplay data residency. If you are under GDPR, DPDP, or HIPAA, you need to know exactly where your data is processed and who has access to it internally at the vendor. โ€œWe're cloud-hostedโ€ is not an answer.
02
Walk me through your last security incident.
Every mature vendor has had incidents. The ones worth trusting are the ones who can talk about them clearly, what went wrong, how fast they responded, how they communicated with customers, and what changed afterward. Evasion here is a serious red flag.
03
What frameworks are you certified against, and can I see the audit report?
ISO 27001 and SOC 2 Type II are the baseline you should expect. But do not just accept the badge, ask for the actual audit report or at minimum the management letter. A SOC 2 Type I from 2021 tells you almost nothing about their current posture.
04
Who are your sub-processors and what is your vendor risk management process?
Your vendor's vendor is your problem too. Ask for a sub-processor list and ask how they assess and monitor those third parties. If they cannot produce this document, that is itself the answer.
05
What is your patch and vulnerability management cycle?
How quickly do they apply critical patches to their own infrastructure? What is their SLA for remediating high-severity CVEs? A vendor who takes 90 days to patch a critical vulnerability in their own stack is not a vendor you can trust with yours.

What Certifications Actually Mean

Security certifications have become a bit like hygiene badges, everyone has them, but they do not all mean the same thing.

CertificationWhat It MeansWhat It Doesn't MeanRequire?
ISO 27001Documented ISMS reviewed by an accredited auditorThat every control is watertight or continuously monitoredโœ“ Yes
SOC 2 Type IIControls tested over 6โ€“12 months, not a point in timeThat scope covers everything you care aboutโœ“ Yes, prefer Type II
SOC 2 Type IControls existed at a single point in timeThat they work consistently under real conditionsโšก Acceptable if recent
Pen Test ReportA third party actively tried to break themThat findings were fully remediatedโœ“ Ask for remediation summary
GDPR/HIPAA 'Compliant'Usually just a self-assessmentFormal certification (neither framework has one)โœ— Ask for DPA/BAA instead
๐Ÿ’ก Pro Tip

Always ask for the SOC 2 report's scope section first. Vendors sometimes get SOC 2 certified for a narrow slice of their infrastructure, not the systems that actually handle your data. Scope gaps are one of the most common ways vendors technically hold a certification that does not apply to how you use them.

Red Flags That Are Easy to Miss

Contract review red flags for security vendors
The subtler red flags often appear in the contract rather than the conversation, this is where vendors embed language that shifts risk back to you.
๐Ÿšฉ Red Flags to Watch For
  • They refuse to share their SOC 2 report without a custom NDA that takes weeks to negotiate
  • Their certifications are more than 18 months old and they cannot explain why
  • They have no written sub-processor list, or it has not been updated since last year
  • Support SLAs are buried in appendices and worded to give them maximum wiggle room
  • They cannot name a specific person responsible for your account's security incidents
  • The security questionnaire goes to their sales team, not their security team
  • They promise compliance with your framework but cannot map their controls to it
  • Their breach notification clause gives them 72 hours or more to notify you

The Evaluation Scorecard

Use this framework to score vendors consistently across the dimensions that actually matter. Apply it across every vendor to create a true apples-to-apples comparison.

โœ… Vendor Evaluation Dimensions

โœ“
Certifications
ISO 27001 and SOC 2 Type II, current, in-scope, available on request without friction
โœ“
Data Residency & Sub-Processors
Documented, compliant with your regulatory obligations (GDPR, DPDP, HIPAA)
โœ“
Incident History & Response
Clear, tested incident response process, they can describe a real incident and what changed
โœ“
Penetration Testing
Annual third-party tests with evidence of remediation, not just findings
โœ“
SLA & Support Quality
Enforceable SLAs for critical issues, dedicated security contacts, not a shared queue
โœ“
Contractual Protections
DPA/BAA in place, breach notification โ‰ค48 hours, reasonable liability cap
โœ“
Business Continuity
Tested BCP/DR plan, uptime SLA with transparent incident history

Getting the Contract Right

Even if a vendor checks every box in the evaluation, the contract is where things can quietly go wrong. These are the clauses that matter most from a security and compliance standpoint.

โš ๏ธ Watch These Contract Clauses

Limitation of liability clauses that cap vendor exposure to one month of fees are extremely common and extremely dangerous. If a vendor breach results in a regulatory fine under GDPR, that fine can reach 4% of your global annual turnover. One month of SaaS fees will not touch it. Push for reasonable liability coverage tied to actual harm, or seek cyber insurance that explicitly covers third-party vendor incidents.

The most important contractual element for compliance-focused organisations is the Data Processing Agreement (DPA) or Business Associate Agreement (BAA) under HIPAA. Without a valid DPA, you are technically in breach of GDPR every time personal data flows to that vendor.

โœ… Non-Negotiable Contract Items

Breach notification within 48 hours ยท Explicit right to audit ยท Sub-processor change notification with 30+ days notice ยท Data deletion on contract termination within 30 days with written certification ยท Liability coverage that reflects actual risk exposure rather than one month of fees

Not sure if your vendors are actually secure?

SecComply's third-party risk assessments help you build a vendor program that satisfies ISO 27001 Annex A and SOC 2, and actually protects your organisation.

Book a Free Consultation โ†’

Frequently Asked Questions

At minimum annually, and immediately when a vendor has a known security incident, changes ownership, or substantially changes how they process your data. ISO 27001 explicitly requires ongoing supplier management, not just initial due diligence.
It can satisfy the requirement to evidence third-party assessment, but your auditor will ask pointed questions about scope and recency. SOC 2 Type II is significantly stronger evidence because it demonstrates controls working over time, not just existing at a point in time.
If they hold a current SOC 2 Type II report covering your use case, that report often substitutes for a questionnaire response. If they refuse both, that refusal must be documented in your vendor risk register with compensating controls noted, or escalated to a leadership decision about whether the relationship is tenable.
Under GDPR and India's DPDP Act, yes, for any vendor who processes personal data on your behalf as a data processor. This includes cloud storage, CRM platforms, email tools, and analytics platforms. A data flow mapping exercise usually surfaces a long list of vendors who need formal DPAs.