SOC 2 Vendor Management: How to Handle Third-Party Risk Without Drowning in Questionnaires | Lorikeet Security Skip to main content
Back to Blog

SOC 2 Vendor Management: How to Handle Third-Party Risk Without Drowning in Questionnaires

Lorikeet Security Team March 8, 2026 10 min read

The Vendor Problem Every SOC 2 Organization Faces

Your SOC 2 report covers your controls. But your infrastructure runs on other companies' platforms. Your customer data flows through third-party APIs. Your employees use SaaS tools that you do not control. And your auditor knows all of this.

Third-party risk management is one of the most consistently challenging areas of SOC 2 compliance, not because the requirements are complex but because the operational burden scales with every vendor you add. A typical SaaS company with 100 employees uses 80 to 120 SaaS tools. Sending security questionnaires to all of them is not just impractical -- it is the wrong approach entirely.

The good news is that SOC 2 does not require you to assess every vendor with equal rigor. It requires you to have a risk-based vendor management program that focuses your attention on the vendors that actually matter to your security posture. This guide covers exactly how to build that program and what your auditor will expect to see.

Key insight: SOC 2 vendor management is not about eliminating vendor risk. It is about demonstrating that you understand your vendor risk, have a process for managing it, and can show evidence that the process works.


What SOC 2 Actually Requires for Vendor Management

Vendor management requirements in SOC 2 are spread across multiple Trust Services Criteria, but the primary controls sit under CC2 (Communication and Information) and CC9 (Risk Mitigation). Here is what each requires in the context of vendor oversight.

CC2.3 -- Communication with Third Parties

This control requires that your organization communicates its security commitments, system requirements, and responsibilities to external parties including vendors. In practice, this means:

CC9.2 -- Risk Mitigation Through Vendor Management

CC9.2 is the core vendor management control. It requires that your organization assesses and manages risks associated with vendors and business partners. The AICPA expects:

Complementary Subservice Organization Controls

When a vendor provides services that are integral to your control environment -- your cloud hosting provider is the most common example -- they are classified as a subservice organization. This is where vendor management gets more nuanced and where auditors pay the most attention.


Inclusive vs. Carve-Out: Understanding Your Options

When your SOC 2 report references subservice organizations, you have two options for how their controls are presented. This decision has significant implications for your audit scope and cost.

Aspect Inclusive Method Carve-Out Method
Definition Subservice organization's controls are included in your SOC 2 report and tested by your auditor Subservice organization's controls are excluded from your report; their own SOC 2 report is referenced instead
Auditor Access Your auditor needs direct access to test the subservice organization's controls Your auditor reviews the subservice organization's own SOC 2 report
Cost Impact Significantly higher audit fees due to expanded scope Lower cost; you only need to obtain and review their SOC 2 report
Vendor Cooperation Requires extensive cooperation from the subservice organization Minimal cooperation needed; just their SOC 2 report
Common Usage Rare; typically only when you and the subservice organization share the same parent company Used in the vast majority of SOC 2 reports
User Responsibility Fewer complementary user entity controls (CUECs) for your customers to implement Your report lists CUECs that your customers must implement

In practice, nearly every organization uses the carve-out method. AWS, Azure, GCP, Stripe, Twilio -- none of these companies will allow your auditor to test their controls directly. They publish their own SOC 2 reports, and your auditor references those reports in your audit.

What your auditor will verify with the carve-out method: That you have obtained and reviewed the subservice organization's most recent SOC 2 report, that you have evaluated any exceptions or qualified opinions in that report, that you have identified and implemented any Complementary User Entity Controls (CUECs) described in their report, and that you monitor for any changes in their service that could affect your controls.


Building a Risk-Based Vendor Classification System

The foundation of an efficient vendor management program is classification. Not all vendors carry the same risk, and your program should reflect that reality. Sending a 200-question security questionnaire to the company that provides your office plants is a waste of everyone's time.

Step 1: Build Your Vendor Inventory

Start with a complete list of every vendor that touches your business. Include:

Step 2: Classify by Risk Tier

Assign each vendor to a risk tier based on two primary factors: data access and service criticality.

Risk Tier Criteria Assessment Frequency Assessment Depth
Critical Stores or processes customer data, or provides infrastructure that hosts your production environment Annually (minimum) SOC 2 report review + CUEC validation + contract review + ongoing monitoring
High Has access to internal systems or employee data, or provides services that could impact availability Annually SOC 2 or ISO 27001 review + security questionnaire + contract review
Medium Has limited access to non-sensitive data, or provides non-critical business services Every 2 years Security questionnaire or self-attestation + contract review
Low No access to sensitive data, no system access, non-critical service At onboarding only Basic due diligence (website review, business verification)

This tiered approach is exactly what auditors expect. They do not want to see that you sent identical 200-question questionnaires to both your cloud hosting provider and your catering company. They want to see that you understand the risk each vendor poses and have proportionate oversight measures in place.


Vendor Due Diligence: What to Actually Assess

Once you have classified your vendors, you need a practical assessment methodology for each tier. Here is what to evaluate and what evidence to collect.

For Critical and High-Risk Vendors

When a Vendor Does Not Have a SOC 2 Report

Not every vendor will have a SOC 2 report, especially smaller or newer companies. This does not automatically disqualify them, but you need alternative evidence of their security posture:

Document your rationale: If a critical vendor lacks a SOC 2 report and you decide to proceed with them, document your risk acceptance decision. Include what alternative evidence you reviewed, what compensating controls you implemented, and who approved the vendor onboarding. Auditors are reasonable -- they want to see that you made an informed decision, not that you ignored the risk.


The Vendor Security Questionnaire: Making It Work

Security questionnaires are the most common assessment tool for vendor due diligence, and also the most despised. Both sides hate them -- the sender because responses are slow and unreliable, and the recipient because they are repetitive and time-consuming. Here is how to make them actually useful.

Designing an Effective Questionnaire

Avoid the temptation to send a 300-question behemoth. A well-designed vendor security questionnaire should be:

Core Questions That Matter for SOC 2

For critical and high-risk vendors, these are the questions that directly map to SOC 2 requirements and produce useful information:

  1. Certifications and reports -- Do you have a current SOC 2 Type II report, ISO 27001 certification, or equivalent? Can you provide a copy?
  2. Data handling -- Where is our data stored geographically? Is it encrypted at rest and in transit? What encryption algorithms and key lengths are used?
  3. Access controls -- Who within your organization has access to our data? How is access granted, reviewed, and revoked? Do you enforce MFA for privileged access?
  4. Incident response -- What is your breach notification timeline? Who is our point of contact for security incidents? Can you provide your incident response policy?
  5. Subprocessors -- Do you use subprocessors that have access to our data? Who are they and where are they located?
  6. Business continuity -- What is your RTO and RPO? How often do you test backups and disaster recovery procedures?
  7. Security testing -- Do you conduct regular penetration testing? Can you provide a summary of your most recent test results?
  8. Employee security -- Do you perform background checks? What security awareness training do employees receive?

Continuous Vendor Monitoring: Beyond the Annual Questionnaire

An annual security questionnaire is the minimum. For critical vendors, your auditor will expect to see evidence of ongoing monitoring between formal assessments. This ties directly into your continuous monitoring program.

Practical Continuous Monitoring Approaches

For organizations using compliance automation platforms, many of these monitoring tasks can be partially automated. Platforms like Vanta and Drata integrate with vendor risk management tools to track SOC 2 report expiry dates, flag vendors without current certifications, and centralize questionnaire responses.


What Auditors Actually Look For in Vendor Management

Based on our experience supporting organizations through SOC 2 audits, here is what auditors consistently focus on during vendor management review. Understanding this helps you prioritize your efforts and avoid common audit findings.

Evidence Auditors Request

Common Findings That Trip Organizations Up


Building Your Vendor Management Program: Step by Step

Here is a practical implementation guide for organizations building a vendor management program from scratch or significantly improving an existing one before their next SOC 2 readiness assessment.

Phase 1: Foundation (Weeks 1-2)

Phase 2: Assessment (Weeks 3-6)

Phase 3: Contracts and Controls (Weeks 7-8)

Phase 4: Operationalize (Ongoing)


Vendor Management for Startups: Right-Sizing Your Program

If you are a startup pursuing SOC 2, the vendor management requirements can feel overwhelming. You are a 30-person company being asked to assess the security of Amazon Web Services. The key is proportionality.

For early-stage companies, focus on these essentials:

Startup tip: Most major cloud providers, SaaS platforms, and infrastructure vendors publish SOC 2 reports. Check their trust center, compliance page, or security documentation first. If you cannot find it, email their security team directly. Requesting a SOC 2 report is a standard practice and they will have a process for sharing it.

As your company grows and your vendor ecosystem expands, you can mature your program by adding formal questionnaires, automated monitoring tools, and dedicated vendor risk management resources. But for your first SOC 2 audit, the basics done consistently will pass.


Connecting Vendor Management to Your Broader SOC 2 Program

Vendor management does not exist in isolation. It connects to nearly every other area of your SOC 2 compliance program:

The organizations that handle vendor management most efficiently are those that integrate it into existing processes rather than treating it as a separate compliance workstream. When vendor assessment is part of procurement, vendor monitoring is part of your security operations, and vendor risk is part of your risk register, the program runs itself.

Need Help with SOC 2 Vendor Management?

Lorikeet Security helps organizations build practical vendor management programs that satisfy SOC 2 requirements without creating unnecessary operational overhead. From readiness assessments to ongoing compliance support.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!