Assessing third-party risk compliance consists of several key criteria:
Data storage, transmission, and access
Where does the vendor physically store your data? Cross-border data transfers may fall under multiple jurisdictions, complicating compliance, unless the vendor offers data residency options.
What encryption standards are used?
- Data at rest: Vendors must use strong, modern encryption (e.g., AES-256 where appropriate) and clear crypto-agility plans.
- Data in transit: Data moving between the client and the vendor, or between the vendor's internal microservices, must be encrypted using TLS 1.2+ (TLS 1.3 is preferred).
Encryption is only as strong as the key management. Ideally, the vendor should support customer-managed keys (CMK) or use hardware security modules (HSMs) to securely manage encryption keys.
Identity and access management (IAM) & MFA
Credential theft remains a top attack vector, accounting for 22% of breaches. Vendors must enforce identity and access controls, including mandatory MFA (especially phishing-resistant MFA) for all access to client data and for the vendor's own internal admin access. Role-based access control (RBAC) further limits who has admin rights.
Logging, monitoring, and incident response
Does the vendor collect immutable logs? Can they export them to your SIEM? Without logs, forensic analysis is impossible. If a vendor can’t tell you what was accessed during a breach, you have to assume the worst. This inflates notification costs and liability. Confirm log retention meets your regulatory needs (PCI requires one year, HIPAA/NIST guidance often implies longer retention).
Does the vendor have an incident response (IR) plan? Is it tested? Check its notification protocols. Many contracts say “without undue delay," which can mean weeks. Look for a vendor that notifies you within 24–72 hours of discovery (not confirmation). Some regulations require specific windows.
Patching and vulnerability management
Exploitation of vulnerabilities (including unpatched systems) accounted for 20% of breaches in 2025, a 34% increase from the prior year. Ensure vendors have clear patch SLAs in their contract. Public guidance varies (for example, CISA advises 15 days for critical and 30 days for high issues), while organizations often adopt faster timelines for actively exploited zero-days. Agree to timelines that match your risk tolerance and regulatory obligations.
Security certifications and regulatory requirements
Certifications are helpful indications of compliance, but they require nuanced interpretation. For instance, when evaluating SOC 2 certification, look for a vendor with a Type 2 report, which assesses the operating effectiveness of controls over a period (usually 6–12 months), rather than just measuring the design of controls at a point in time, as Type 1 does.
ISO 27001 demonstrates a formal information security management system and can support privacy compliance efforts, but it does not by itself ensure legal compliance with CCPA, HIPAA, etc. You’ll still need vendor attestations or controls specific to those laws.