Measure vendor cyber exposure with weighted compliance scoring. Identify weak controls, contractual gaps, and resilience issues. Support safer procurement decisions with clearer remediation priorities.
| Vendor | Data Sensitivity | Criticality | Compliance Gap % | Controls % | Incidents | Monitoring % | Expected Risk Band |
|---|---|---|---|---|---|---|---|
| Critical Cloud Partner | 4 | 5 | 18 | 72 | 2 | 61 | Moderate |
| Payroll Processor | 5 | 5 | 28 | 64 | 3 | 58 | High |
| Marketing SaaS | 2 | 2 | 8 | 88 | 0 | 82 | Low |
The calculator creates four category scores and then blends them into one weighted risk score. Each category is normalized to a 0 to 100 scale. Higher values mean greater vendor risk.
1) Inherent Exposure
= (Data Sensitivity × 40%) + (Service Criticality × 35%) + (Access Level × 25%) after converting 1–5 ratings into percentages.
2) Compliance Posture
= (Compliance Gap % × 45%) + ((100 − Control Effectiveness %) × 35%) + (Certification Risk × 20%).
3) Security Operations
= Incident History + Monitoring Weakness + Training Weakness + Pen Test Risk + MFA Risk, using the listed operational weights.
4) Resilience & Oversight
= Geographic, financial, contractual, remediation, fourth-party, continuity, insurance, and encryption weaknesses using weighted contributions.
Overall Risk Score
= (Inherent Exposure × 30%) + (Compliance Posture × 30%) + (Security Operations × 25%) + (Resilience & Oversight × 15%).
Risk bands used here are: Low under 35, Moderate from 35 to 54.99, High from 55 to 74.99, and Critical at 75 or above.
It estimates third-party cybersecurity and compliance risk by combining inherent exposure, security operations, compliance posture, and resilience oversight into one weighted score.
No. It is a decision-support score for triage and governance. Formal conclusions still require evidence review, legal analysis, and organization-specific risk acceptance rules.
Percentages for control effectiveness, continuity, monitoring, insurance, and training represent maturity or strength. Stronger maturity lowers weakness, so the calculator converts them into residual risk values.
Use 1 for low-impact public or noncritical information and 5 for highly sensitive regulated, financial, health, identity, or business-critical datasets.
Yes. The weights are visible in the code and can be adjusted to align with your procurement model, legal obligations, or sector-specific control framework.
It reflects how well the vendor identifies and governs its own subcontractors, hosting partners, and downstream service providers that may affect your security posture.
Reassess after major incidents, material scope changes, regulatory updates, new integrations, contract renewals, or whenever key evidence becomes outdated.
Escalate for executive review, block onboarding where necessary, tighten contractual safeguards, request remediation proof, and define explicit acceptance conditions before proceeding.
Important Note: All the Calculators listed in this site are for educational purpose only and we do not guarentee the accuracy of results. Please do consult with other sources as well.