This document is under active development and has not been finalized.
Skip to content

Vendor Assessment

Assessment Process

Initial Assessment (Prior to Engagement)

StepDescriptionResponsible
1. Requirements profileDefine security requirements based on protection needsBusiness unit + CISO
2. Information gatheringObtain security documentation, certifications, referencesProcurement
3. EvaluationReview against scoring criteriaCISO
4. Risk assessmentDetermine residual risk, define measuresCISO
5. DecisionApproval or rejectionCISO + Executive Management (for critical vendors)

Scoring Criteria

CriterionWeightScoring Scale
Security certifications (ISO 27001, SOC 2, BSI C5)25%0-3 (none / in progress / available / current)
Incident response capability20%0-3 (no process / basic / documented / tested)
Location / legal jurisdiction15%0-3 (insecure / third country with safeguards / EU / DE)
Contract design15%0-3 (standard / customized / audit rights / comprehensive)
Subcontractor transparency10%0-3 (no info / list / approval required / contractual)
Track record15%0-3 (unknown / < 1 year / 1-3 years / > 3 years)

Minimum scores: 12/18 for standard vendors, 15/18 for critical vendors.

SCORING METHODOLOGY

Each criterion is scored from 0 to 3. The weighted total determines the overall score. Vendors below the minimum threshold must either improve their security posture or be rejected. Exceptions require CISO and executive management approval with documented risk acceptance.

Reassessment Intervals

Vendor CategoryAssessment Interval
Critical infrastructure providersAnnually
Cloud and SaaS providersAnnually
Software suppliersUpon contract renewal
Support partnersEvery 2 years
Event-drivenUpon security incident or significant change at the vendor

Vendor Categorization

CategoryDefinitionExamplesRequirements
CriticalOutage impacts core businessHosting, primary cloud servicesHighest security requirements, annual audit right
ImportantOutage impacts individual servicesSaaS tools, DNS providerHigh requirements, incident reporting obligation
StandardOutage has low impactConsulting, maintenanceBasic requirements

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT