This repository demonstrates a lightweight, repeatable Third-Party/Vendor Risk Intake process that can be used by small to mid-sized organizations.
- A practical vendor intake form
- A simple risk scoring model (impact + exposure)
- Evidence request checklist
- Vendor decision log (approve / approve with conditions / reject)
- A basic vendor review email template
Third-party risk is a common source of security, privacy, and compliance exposure. This mini pack shows how I structure intake, evidence collection, and decision-making in a way that is audit-friendly and scalable.
- Start in
docs/01-workflow.md - Fill out
artifacts/vendor-intake-form.md - Score the vendor using
artifacts/vendor-risk-scorecard.csv - Request evidence using
artifacts/evidence-request-checklist.md - Document the decision in
artifacts/vendor-decision-log.csv
- Fill out the intake:
artifacts/vendor-intake-form.md - Score the vendor:
artifacts/vendor-risk-scorecard.csv - Select evidence based on tier:
artifacts/evidence-request-checklist.md - Document the decision:
artifacts/vendor-decision-log.csv - Set the next review date based on risk tier: see
docs/01-workflow.md