Free Template

Third-Party Risk Assessment Template

Systematically evaluate vendor risk across security controls, data protection, business continuity, compliance, and supply chain. Check off items as you assess each vendor.

Overall Progress: 0/35
0%

Security Controls

0/10

Data Protection & Privacy

0/8

Business Continuity

0/6

Compliance & Governance

0/6

Subprocessors & Supply Chain

0/5

Frequently Asked Questions

When should I perform a third-party risk assessment?

Assess vendors before onboarding, at contract renewal, annually for critical vendors, and after any security incident involving the vendor. Also reassess when the vendor's services or your usage changes significantly.

What are the main categories of third-party risk?

The main categories are: security risk (data breaches, vulnerabilities), compliance risk (regulatory violations), operational risk (service disruptions), and reputational risk (vendor controversies affecting your brand).

How do I prioritize which vendors to assess?

Prioritize based on data sensitivity (vendors with access to personal or confidential data), business criticality (vendors whose outage would stop your operations), and integration depth (vendors connected to your core systems).

Related Resources

Automate third-party risk monitoring

Manual assessments are point-in-time. Coax continuously monitors your vendors' security posture and alerts you to changes.