Skip to content

Vendor Risk

5 automated security scanners


Purpose: The Vendor Financial Viability Scanner is designed to detect supplier insolvency risk and service continuity by analyzing financial health indicators, compliance certifications, and security policies available on the vendor’s website. This tool helps in assessing the financial stability and cybersecurity posture of vendors, ensuring that potential risks are identified before they impact critical business operations.

What It Detects:

  • Policy Indicators: The scanner identifies the presence of a security policy, incident response procedures, data protection measures, and access control mechanisms on the vendor’s website.
  • Maturity Indicators: It detects SOC 2 certification, ISO 27001 compliance, penetration test results, and vulnerability scan reports to gauge the maturity level in information security practices.
  • Financial Health Indicators: The scanner looks for recent financial statements such as annual reports and quarterly earnings, credit ratings from reputable agencies, bankruptcy filings or insolvency notices, and financial news articles indicating financial distress.
  • Trust Center Information: It evaluates the availability of a dedicated trust center page, transparency in reporting security incidents, and regular updates on compliance status and certifications.
  • Public Policy Pages: The scanner checks for the presence of public policy documents related to security and risk management, links to relevant compliance certifications, and information about third-party audits and assessments.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: This scanner is crucial as it helps in assessing the financial health and cybersecurity posture of potential suppliers, which are critical factors that can influence business continuity and security policies. Identifying early signs of financial distress or inadequate security measures can prevent future risks and protect against potential supply chain disruptions.

Risk Levels:

  • Critical: The scanner flags conditions where there is a direct threat to the organization’s operations, such as immediate bankruptcy filings or severe cybersecurity incidents that compromise sensitive data.
  • High: The risk level is elevated when significant financial instability is detected, including negative credit ratings and widespread public distress signals in news articles.
  • Medium: Medium severity findings include less critical but still important indicators of potential issues, such as incomplete security policies or outdated compliance certifications.
  • Low: Informational findings pertain to the presence of basic security measures and minimal financial transparency that do not pose immediate risks but should be monitored for improvement.
  • Info: These are general indications of good practices in cybersecurity and financial reporting that provide a baseline understanding without significant risk implications.

If specific conditions are not detailed in the README, these risk levels can be inferred based on typical severity assessments in such tools.

Example Findings: The scanner might flag a vendor with no security policy as having a critical risk level due to the absence of essential protective measures against cyber threats. Alternatively, it could identify a vendor with consistently low credit ratings and unresolved cybersecurity vulnerabilities as having high financial and medium cybersecurity risks.


Purpose: The Vendor Security Assessment Scanner is designed to evaluate the security posture and control effectiveness of vendors by analyzing their publicly available documentation, policies, trust center information, and compliance certifications. This tool helps in identifying gaps in vendor security measures and ensuring they meet required standards.

What It Detects:

  • Security Policy Indicators: Identifies mentions of “security policy” to ensure the existence of formal security guidelines.
  • Incident Response Plans: Checks for “incident response” plans indicating preparedness for security incidents.
  • Data Protection Policies: Looks for “data protection” policies to assess data handling practices.
  • Access Control Measures: Verifies “access control” measures to ensure proper user and system access management.
  • Maturity Indicators: Detects references to SOC 2 compliance, a widely recognized standard for trust in service organizations.
  • Certifications: Checks for ISO 27001 certification, an international standard for information security management systems.
  • Penetration Testing: Identifies mentions of “penetration test” results or plans, indicating proactive security testing.
  • Vulnerability Scans: Looks for “vulnerability scan” or “assessment” references to ensure regular security assessments are conducted.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: This scanner is crucial as it helps in assessing the security measures of vendors, ensuring that they meet required standards and are prepared to handle potential security incidents effectively.

Risk Levels:

  • Critical: Conditions where there are no formal security policies or clear incident response plans.
  • High: Absence of adequate data protection policies or incomplete access control measures.
  • Medium: Inadequate mention of compliance certifications like SOC 2 or ISO 27001, or infrequent vulnerability scans.
  • Low: Minimal presence of security indicators in documentation but generally compliant with basic security practices.
  • Info: Presence of minimal security information that does not significantly impact overall risk.

Example Findings:

  • A vendor lacking a clearly defined security policy and an up-to-date incident response plan could be flagged as critical.
  • A company without any mention of penetration testing or vulnerability assessments might be considered high risk due to potential blind spots in their security posture.

Purpose: The Fourth-Party Vendor Mapping Scanner is designed to identify and assess extended supply chain risks by analyzing vendor relationships and compliance certifications. It aims to detect potential nth-party exposure and ensure robust vendor risk management through the evaluation of security policies, maturity indicators such as SOC 2 and ISO 27001 standards, accessibility of vendor documentation, public policy pages review, and extraction of information from trust centers.

What It Detects:

  • Security Policy Indicators: Identifies the presence of comprehensive security policies, incident response plans, data protection measures, and access controls in vendor documentation.
  • Maturity Indicators: Checks for compliance with SOC 2 Type II, ISO 27001 standards, penetration testing, and vulnerability assessments as outlined by industry best practices.
  • Vendor Documentation Accessibility: Evaluates the availability of security documentation from vendors on their public websites or trust centers to ensure transparency and accessibility of critical information.
  • Public Policy Pages Review: Scrapes public policy pages to identify any mentions of third-party vendors and their compliance status, providing a clear view of vendor relationships and certifications.
  • Trust Center Information Extraction: Extracts detailed information from vendor trust centers to verify the presence of necessary security standards and certifications required for robust risk management.

Inputs Required:

  • domain (string): The primary domain of the organization under analysis, which serves as the base URL for scanning various paths to gather relevant documentation.
  • company_name (string): The name of the company or entity being analyzed, used for searching within vendor documents and statements related to the specific organization.

Business Impact: This scanner is crucial for organizations aiming to mitigate risks associated with third-party dependencies by ensuring that vendors adhere to stringent security policies and certifications. It helps in maintaining a secure and compliant supply chain, which is essential for both legal compliance and operational resilience.

Risk Levels:

  • Critical: Findings indicating the absence of any security policy or significant maturity gaps without mitigating controls could be considered critical.
  • High: Inadequate response to identified vulnerabilities or missing penetration testing reports can lead to high risks, especially if they directly impact core business functions.
  • Medium: Medium risk findings might include incomplete compliance certifications or partial implementation of recommended security measures that still pose a significant threat but are less severe than critical issues.
  • Low: Informational findings may include minor gaps in documentation or outdated policies, which while not posing immediate threats, should be addressed for continuous improvement and future risk mitigation.
  • Info: These are generally non-critical findings such as minor discrepancies in vendor information that do not significantly impact the organization’s security posture but can provide valuable insights for ongoing monitoring and auditing processes.

Example Findings:

  1. A detected vulnerability in a third-party software component, which could lead to unauthorized access if exploited.
  2. Incomplete documentation regarding compliance with ISO 27001 standards, indicating potential gaps in security practices that need immediate attention.


Purpose: The Vendor Access Review Scanner is designed to identify and mitigate excessive vendor permissions and access creep by thoroughly analyzing company security documentation, public policy pages, trust center information, and compliance certifications. Its primary goal is to ensure that vendors have only the necessary access rights, thereby safeguarding sensitive data and maintaining regulatory compliance.

What It Detects:

  • Excessive Permissions: Identifies instances where vendors are granted broader permissions than required, including overly permissive roles or permissions.
  • Access Creep: Monitors changes in vendor access over time to detect unauthorized expansion of privileges and flags any increases not justified by business needs.
  • Policy Compliance: Ensures that vendor access policies align with industry standards and best practices, verifying compliance with relevant regulations such as SOC 2 and ISO 27001.
  • Documentation Review: Assesses the quality and completeness of security documentation related to vendor access, identifying gaps or inconsistencies in management and documentation practices.
  • Trust Center Information: Evaluates trust center information for transparency regarding vendor access controls, ensuring that trust center content accurately reflects the measures taken to manage vendor access.

Inputs Required:

  • domain (string): The primary domain of the company under analysis, which is used as a base URL for searching relevant documentation and policies.
  • company_name (string): The official name of the company, which helps in identifying specific statements or sections within their documentation that pertain to vendor access.

Business Impact: This scanner plays a crucial role in maintaining a secure third-party ecosystem by ensuring that vendors operate with only the necessary permissions and do not exceed their authorized scope. Compliance with regulations such as SOC 2 and ISO 27001 is essential for many industries, and this tool helps organizations maintain these standards to avoid legal risks and protect sensitive information.

Risk Levels:

  • Critical: The scanner flags critical issues when vendors are granted permissions that exceed their legitimate needs or when there are significant gaps in documentation related to vendor access.
  • High: High severity findings include instances where permissions are overly broad, unauthorized changes in access privileges are detected, and when trust center information does not accurately reflect current access controls.
  • Medium: Medium severity issues involve moderate risks such as incomplete or poorly maintained security documentation that may lead to less visibility into vendor access practices.
  • Low: Low severity findings pertain to minor discrepancies in documentation or minor deviations from best practices, which are still important but carry lower risk.
  • Info: Informational findings highlight areas for improvement in the completeness and accuracy of vendor access policies and documentation that do not currently pose a significant risk.

Example Findings:

  1. A vendor has been granted administrative privileges beyond those required to perform their contractual obligations, which could lead to unauthorized data access.
  2. The trust center does not accurately reflect the current access controls for vendors, potentially misleading stakeholders about compliance with regulatory standards.

Purpose: The Geopolitical Supplier Risk Scanner evaluates the geographic concentration and political stability of suppliers to identify potential risks associated with vendor locations. This helps in assessing the resilience and reliability of supply chains against geopolitical events.

What It Detects:

  • Geographic Concentration: Identifies suppliers located in a single or few countries, which could be vulnerable to localized disruptions due to their concentration.
  • Political Stability Indicators: Analyzes political stability scores and reports of unrest in supplier countries, including historical data on political instability such as coups, elections, and protests.
  • Compliance Certifications: Searches for compliance certifications like SOC 2, ISO 27001, and penetration testing reports to ensure suppliers meet security standards.
  • Policy Review: Examines company security documentation for relevant policies on vendor risk management, including incident response plans, data protection measures, and access controls.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: Assessing the geopolitical risks associated with suppliers is crucial for maintaining a resilient and secure supply chain, which can directly impact business continuity and security posture against potential disruptions caused by geopolitical events.

Risk Levels:

  • Critical: Findings that indicate critical risk include suppliers located in politically unstable countries or regions with documented unrest.
  • High: High-risk findings involve suppliers without adequate compliance certifications or incomplete policy documentation, which can lead to significant operational disruptions if faced with geopolitical challenges.
  • Medium: Medium-risk findings pertain to suppliers with mixed political and geographical risks, requiring close monitoring for potential vulnerabilities in the supply chain.
  • Low: Low-risk findings are those that show minimal or no detected issues regarding geographic concentration or political stability.
  • Info: Informational findings include details about compliance certifications and policy outlines but do not directly impact critical business operations.

Example Findings:

  • A supplier located in a country with frequent coups could be flagged as critical risk due to the unpredictable nature of its operational environment.
  • A partner without ISO 27001 certification is identified as high risk, potentially exposing sensitive data and increasing vulnerability to security breaches.