Skip to content

Vendor Risk Assessment

Vendor risk assessment illustration

Vendor risk assessment is a core GRC activity — understanding the security posture of your third-party relationships is essential for protecting your organisation. The SCF Controls Platform provides automated risk scoring, AI-powered research, DPSIA assessments, claim verification, and comprehensive reporting to streamline this process.

All assessment features are accessed from the Vendor Detail page.

The platform calculates vendor risk using five weighted factors drawn from automated research and vendor records:

FactorWeightWhat It Measures
Breach History25%Known data breaches from Have I Been Pwned (HIBP)
Certification Status20%Valid security certifications (ISO 27001, SOC 2, etc.)
CVE Severity20%Known vulnerabilities from CVE/NVD databases
Regulatory Actions15%Enforcement actions from regulatory bodies
Data Handling20%Risk signal based on data sensitivity and handling practices

Each factor produces a score (0–25 points). The weighted scores are combined, then mapped to a likelihood (1–5) and impact (1–5) scale. The final risk score is Likelihood × Impact, giving a range of 1–25.

Score RangeRisk LevelRecommendation
1–4LowApprove
5–9MediumApprove with monitoring
10–16HighConditional approval
17–25CriticalReject or escalate
  1. Open the vendor’s Detail page
  2. Scroll to the Risk Scoring section
  3. Click Calculate Risk
  4. The platform analyses all available data and produces the score instantly

The risk scoring section displays:

  • Factor breakdown — Individual scores for each of the five factors with visual bars
  • Final risk score — The combined score (1–25)
  • Risk level — Low, Medium, High, or Critical with colour-coded badge
  • AI analysis — A narrative summary explaining the key risk drivers and considerations

The platform tracks both inherent risk (before controls) and residual risk (after controls):

Risk TypeDefinitionHow It’s Calculated
Inherent RiskThe vendor’s raw risk exposure before any mitigating controlsWeighted factors excluding certifications
Residual RiskThe remaining risk after accounting for implemented controlsAdjusted by CIA control scores and valid certifications

The difference between inherent and residual risk demonstrates the effectiveness of your vendor management programme. See Risk Management for more on the inherent vs residual risk concept.

The platform can automatically research a vendor’s security posture by querying multiple external databases.

SourceData Retrieved
HIBP (Have I Been Pwned)Known data breaches involving the vendor
CISA KEVKnown exploited vulnerabilities
CVE/NVDPublished Common Vulnerabilities and Exposures
Regulatory databasesEnforcement actions and compliance findings
  1. Open the vendor’s Detail page
  2. Navigate to the AI-Powered Research section
  3. Click Run Research
  4. The platform dispatches an asynchronous research job
  5. Results appear when processing completes (typically under a minute)

Research results include:

  • Overall risk signal — A summary risk indicator (Low, Medium, High, or Critical)
  • Per-source data — Detailed findings from each queried database
  • Breach details — Dates, affected data types, and severity for any breaches found
  • Vulnerability counts — Total CVEs with severity distribution

Research results feed directly into the 5-factor risk scoring model.

The Data Protection & Security Impact Assessment (DPSIA) is the platform’s most comprehensive assessment tool. It uses an AI engine to produce a detailed analysis covering data privacy, security posture, regulatory compliance, and overall risk.

A DPSIA evaluates the data protection and security risks of engaging a vendor. It considers the services used, the data role (controller or processor), and the broader context of the relationship to produce a structured assessment with a traffic-light rating (RAG status) and actionable recommendation.

FieldRequiredDescription
Services UsedYesWhat services from this vendor are you using?
Assessment TypeYes”New” for first assessment, “Update” for follow-up
Data RoleYesYour organisation’s role: Controller or Processor
Client NameNoWhich client or project this assessment relates to
Additional ContextNoAny extra information for the AI assessor
  1. Open the vendor’s Detail page
  2. Navigate to the AI-Powered Research section
  3. Complete the DPSIA form fields
  4. Click Assess with AI
  5. The platform dispatches the assessment to a dedicated AI engine
  6. A progress indicator shows the assessment status
  7. Results appear automatically when processing completes

When the assessment completes, you’ll see:

  • RAG Status — A traffic-light rating:
    • GREEN — Low risk, approve
    • AMBER — Medium risk, approve with conditions
    • RED — High risk, reject or escalate
  • Recommendation — Approve, Conditional Approval, or Reject
  • Risk Score — Numeric score (1–25)
  • Expandable sections covering:
    • Overall Risk Assessment
    • Data Privacy Risks
    • Security Posture
    • Regulatory Compliance
    • Detailed AI Analysis

Each DPSIA assessment generates a professional DOCX report:

  1. Locate the completed DPSIA assessment in the AI-Powered Research section
  2. Click Download DOCX
  3. The report downloads as a formatted Word document

This report is suitable for sharing with stakeholders, attaching to audit evidence, or including in board reporting.

Claim verification cross-references what a vendor claims about their security posture against the evidence gathered through research and assessments.

  1. Open the vendor’s Detail page
  2. Scroll to the Claim Verification section
  3. Click Trigger Verification
  4. The platform analyses vendor claims against research data
StatusDescription
ConfirmedVendor claim is supported by evidence
UnverifiedInsufficient evidence to confirm or deny
DiscrepancyEvidence contradicts the vendor’s claim
AnomalyUnexpected finding requiring investigation

The summary bar at the top shows the count for each status. Review any Discrepancy or Anomaly findings carefully — these may indicate vendor misrepresentation or outdated information.

Controls are assessed across the three pillars of information security:

PillarFocus Areas
ConfidentialityEncryption, access control, data masking
IntegrityAudit logging, change management, checksums
AvailabilityRedundancy, disaster recovery, SLAs
  1. Navigate to the CIA Control Breakdown section on the Vendor Detail page
  2. Click Add Control
  3. Select the pillar (Confidentiality, Integrity, or Availability)
  4. Enter the control name and category
  5. Set the score (1–5)
  6. Click Save

The platform calculates overall control effectiveness (0–100%) from two sources:

  • CIA control scores — Contribute up to 60% of the effectiveness rating based on average scores across all three pillars
  • Valid certifications — Each valid certification adds 10%, up to a maximum of 40%

Control effectiveness feeds into the residual risk calculation, reducing the inherent risk score proportionally.

Track remediation tasks that arise from vendor assessments.

  1. Navigate to the Action Items section
  2. Click Add Action Item
  3. Enter the title, description, and due date
  4. Set the priority and assign an owner
  5. Click Save
PriorityDescription
CriticalRequires immediate attention — blocking risk
HighShould be addressed within days
MediumAddress within the normal review cycle
LowAddress when resources allow

Action items support inline status updates — use the status dropdown directly in the table to move items through:

OpenIn ProgressCompleted

This makes it quick to update task progress without opening a separate form.

When a vendor cannot fully meet a security requirement, document the gap and your mitigation strategy as a compensating control.

  1. Navigate to the Compensating Controls section
  2. Click Add Compensating Control
  3. Describe the gap — what the vendor doesn’t provide
  4. Describe the compensating control — how your organisation mitigates the gap
  5. Set the effectiveness rating
  6. Click Save
RatingDescription
FullCompensating control fully addresses the gap
PartialGap is partially mitigated — some residual risk remains
MinimalLimited mitigation — significant residual risk

Generate comprehensive reports that consolidate all vendor assessment data into a single document.

  1. Navigate to the Reports section on the Vendor Detail page
  2. Click Generate Report
  3. The platform compiles a 14-section report from all available assessment data
#Section
1Executive Summary
2Vendor Profile
3Risk Assessment Overview
4Breach History Analysis
5Certification Status
6CVE/Vulnerability Analysis
7Regulatory Compliance Status
8Data Handling Risk
9Claim Verification Summary
10CIA Control Assessment
11Action Items & Remediation
12Compensating Controls
13AI Analysis & Recommendations
14Overall Risk Rating & Recommendation

Click the Preview button on any generated report to view it in a modal overlay. This lets you review content before exporting or sharing.

Export reports in multiple formats:

FormatUse Case
PDFFormal distribution and archiving
DOCXEditing and annotation in Microsoft Word
JSONIntegration with other systems
MarkdownLightweight documentation and version control

Send reports directly to stakeholders:

  1. Click the Email button on the report
  2. Enter recipient email addresses
  3. Click Send
  4. Recipients receive the report as an attachment

The following diagram illustrates how data sources feed into the 5-factor risk scoring model to produce a final risk level and recommendation:

  • Critical vendors — Assess at least quarterly and after any security incident
  • High criticality vendors — Assess semi-annually
  • Medium/Low vendors — Assess annually or at contract renewal
  1. Run AI research first — Populate the data sources before calculating risk scores
  2. Add certifications upfront — Valid certifications improve the risk calculation
  3. Complete CIA controls — Detailed control assessments enable accurate residual risk
  4. Use DPSIA for critical vendors — The AI-powered assessment provides the deepest analysis
  5. Verify claims — Cross-reference vendor statements against evidence
  1. Generate reports after each assessment cycle — Maintain a documented audit trail
  2. Track action items to completion — Open remediation tasks represent unmanaged risk
  3. Document compensating controls — Show auditors how you’re mitigating vendor gaps
  4. Email reports to stakeholders — Keep risk owners and leadership informed