Score vendor security posture using weighted, auditable inputs. Track evidence, access, and incidents across critical vendors. Export reports for governance teams and faster decisions.
| Vendor | Criticality | Sensitivity | Access | Maturity | Incidents | Evidence | Contract | Geo/Reg | Monitoring | Subproc | Notify Days |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Acme Payments | 5 | 5 | 4 | 4 | 1 | 4 | 4 | 3 | 4 | 4 | 7 |
| Zen HR Tools | 3 | 3 | 2 | 3 | 0 | 2 | 3 | 2 | 3 | 2 | 10 |
| Northwind Support | 2 | 2 | 2 | 2 | 3 | 1 | 2 | 4 | 2 | 6 | 14 |
Most security programs find that 15–25% of vendors handle sensitive data or production access, yet these vendors drive the majority of third‑party risk. Use this calculator to flag that subset quickly by combining criticality, sensitivity, and access level into one consistent score.
A vendor rated 5 for criticality and sensitivity should rarely be reviewed less than quarterly unless evidence is exceptional.
Audits and attestations often age out before renewal cycles. A practical benchmark is to refresh core evidence at least every 12 months for moderate tiers and every 6 months for elevated tiers. If evidence is missing or outdated, lower the “Compliance Evidence” input to reflect reduced assurance.
Evidence can include SOC reports, ISO certificates, pen test summaries, and policy excerpts with dates. Many teams track an evidence freshness target of ≤ 180 days for critical vendors.
Programs that prioritize mature, tested controls typically see fewer high-impact vendor incidents. In this model, control maturity carries the largest weight in control-focused profiles, because it captures repeatable processes like secure SDLC, access reviews, logging, and vulnerability management.
When maturity is rated 1–2, prioritize remediation milestones and reassess the score after new evidence is produced.
Subprocessors expand the attack surface and complicate incident coordination. The calculator applies a capped penalty to keep scoring stable while still reflecting rising dependency risk. Vendors with five or more subprocessors should maintain an up-to-date subprocessor list and flow-down requirements.
Monitor change events such as new hosting regions or subcontractor swaps. If monitoring strength is 1–2, increase review cadence and require continuous signals.
Breach notification timelines affect containment and regulatory reporting. A three-day notice earns a small boost; longer than fourteen days triggers a penalty. Pair the score with a remediation plan: tighten SLAs, reduce privileges, and add monitoring signals so reviewers can validate improvements over time.
Use the tier output to standardize governance: Low Risk annual, Moderate semiannual, Elevated quarterly, and High monthly until key actions are closed. Trend scores to show measurable reduction.
It is a weighted 0–100 indicator of vendor control strength, evidence quality, and contractual readiness after small adjustments for complexity and notification SLAs.
Use Balanced for general programs. Choose control-focused when technical controls matter most, evidence-focused when audits drive assurance, and assurance-focused when attestations and incidents dominate decisioning.
Yes. Select Custom Weights and set higher values for your most important drivers, such as access level or data sensitivity. The tool normalizes inputs so the weighting remains consistent.
Follow the recommended cadence: annual for Low Risk, semiannual for Moderate, quarterly for Elevated, and monthly for High Risk until remediation actions are completed or scope changes stabilize.
Criticality, sensitivity, privileged access, and control maturity typically drive outcomes. For top-tier vendors, keep evidence fresh, strengthen monitoring, and validate right-to-audit and breach notification clauses.
No. It supports governance by standardizing scoring and documenting rationale. Final decisions should include legal review, technical testing, and change-event monitoring aligned to your program requirements.
Important Note: All the Calculators listed in this site are for educational purpose only and we do not guarentee the accuracy of results. Please do consult with other sources as well.