In this article:
Want us to find IT vendors for you?
Share your vendor requirements with one of our account managers, then we build a vetted shortlist and arrange introductory calls with each vendor.
Book a call

IT Vendor Due Diligence: A Practical Process and Checklist for IT Leaders

An IT vendor due diligence framework for IT leaders. Covers vendor tiering, security posture, technical architecture, SLA review, and ongoing vendor risk assessment.

Author:
Date

Vendor due diligence is the disciplined process of investigating a vendor's technical, security, operational, financial, and legal posture before you commit, and continuously after you do. It is your primary defense against inheriting someone else's risk.

Most teams either do too little (a questionnaire and a handshake) or too much (a six-week audit for a low-risk SaaS tool). What follows is a practical framework for calibrating the depth of scrutiny to what the vendor actually touches.

‍

What Vendor Due Diligence Actually Covers

Procurement teams often treat vendor due diligence as a contract review and a compliance checkbox. That scopes it too narrowly.

‍

Real vendor due diligence covers six distinct dimensions: financial stability, legal and regulatory standing, security posture, technical architecture, operational resilience, and reputational risk. Each one can derail a deployment in a different way. A vendor can hold a valid SOC 2 certificate and still run an architecture that collapses under production load. Clean financials tell you nothing about support quality after the contract is signed.

For IT leaders, the technical and security dimensions require far more scrutiny than standard procurement frameworks allocate. You are evaluating a system that will touch your infrastructure, your data, and your users. That evaluation belongs to your team.

Six Dimensions of Vendor Due Diligence
Each dimension maps to a distinct failure mode. A gap in any one of them can derail a deployment.
🏦
Financial Stability
Audited financials, liabilities, customer concentration, and long-term viability. Vendor bankruptcy forces a migration you never planned for.
High impact
βš–οΈ
Legal & Regulatory Standing
Active litigation, sanctions screening, PEP checks, and alignment with GDPR, HIPAA, DORA, and PCI DSS obligations.
High impact
πŸ”
Security Posture
SOC 2 Type II scope, ISO 27001 SoA, pen test results, encryption standards, and incident response plans. Certifications are a starting point.
Critical
πŸ—οΈ
Technical Architecture
Data flows, API stability, IAM patterns, logging, RTO/RPO, and PoC in your environment. Where most IT teams underinvest.
Critical
βš™οΈ
Operational Resilience
SLA terms, uptime calculation, support coverage, escalation paths, release cadence, and webhook delivery guarantees.
Medium impact
πŸ”­
Reputational Risk
Breach history, fourth-party dependencies, customer references, and market concentration. What the vendor wouldn't volunteer in a sales call.
Medium impact

‍

When to Trigger a Vendor Due Diligence Review

35.5% of all data breaches in 2024 originated from third-party compromises, up 6.5% from the year before. The majority of those exposures happened inside existing vendor relationships, after the initial due diligence was done and the contract was signed.

Vendor due diligence is a repeating discipline, not a one-time gate. These are the seven conditions that should trigger a formal review:

  • Net-new vendor onboarding that involves sensitive data, critical infrastructure, or deep system integration
  • Contract renewals where pricing, scope, or service terms are changing materially
  • Data sensitivity shifts on your side, such as expanding into PII, PCI, or PHI handling
  • Vendor product or architecture changes including new API versions, AI feature additions, or infrastructure migrations
  • Security signals such as a vendor appearing in breach disclosures, a security rating drop, or a public incident affecting their platform
  • Corporate events at the vendor including acquisitions, leadership changes, or funding instability
  • Regulatory changes that alter your compliance obligations under GDPR, CCPA, HIPAA, DORA, or PCI DSS

The depth of each review scales with the vendor's tier. How to determine that tier is the next step.

‍

How to Tier Your Vendors Before You Start

The average company now manages 286 vendors, and the average TPRM professional is personally responsible for assessing 33 of them. Running a full due diligence process on every vendor in that inventory is operationally impossible. Tiering solves this by matching scrutiny to actual exposure.

Assign every vendor to one of three tiers before any review begins:

‍

Tier 1: Critical β€” The vendor handles sensitive data (PII, PHI, PCI), provides mission-critical infrastructure, or integrates deeply with core systems. A failure here is a business event. These vendors require the full due diligence process including architecture review, PoC, and contract security exhibits.

Tier 2: Significant β€” The vendor has system access or handles internal data, but a failure is recoverable within normal operations. These require security posture review, SLA validation, and legal review, but not a full technical deep-dive.

Tier 3: Standard β€” The vendor has no access to sensitive data or core systems. A basic company and compliance check is sufficient.

Re-tier vendors when their integration depth or data access changes. A Tier 3 vendor that starts receiving customer data mid-contract becomes a Tier 1 problem.

‍

The IT Vendor Due Diligence Checklist

The checklist below is the operational core of your vendor due diligence process. Each category maps to a specific failure mode. Work through them in sequence for Tier 1 vendors. For Tier 2, apply the first four. For Tier 3, the first two are sufficient.

Company and Financial Health

Start with whether the vendor will exist in three years. A platform migration forced by vendor bankruptcy costs far more than a thorough upfront financial review.

Collect and review:

  • Certificate of incorporation, business license, and corporate structure
  • Last two years of audited financial statements or, for private companies, a financial health summary
  • Outstanding loans, liabilities, and customer concentration (a vendor deriving more than 40% of revenue from a single customer carries concentration risk)
  • Key personnel backgrounds and any active litigation or regulatory enforcement actions
  • Sanctions list checks (OFAC, EU, UN) and Politically Exposed Persons (PEP) screenings for executive leadership

For early-stage or private vendors, ask directly: what happens to your data if the company is acquired or wound down? The answer should be in the contract, not just the conversation.

Security Posture and Compliance

83% of customers now prioritize vendors with SOC 2 compliance, but a certificate on file is not the same as a credible security posture. Read the report, not just the cover page.

Specifically, verify:

  • SOC 2 Type II (not Type I): check the audit period, scope boundaries, and any exceptions noted by the auditor
  • ISO 27001: review the Statement of Applicability (SoA), not just the certificate
  • Penetration test results from the last 12 months, conducted by an independent third party
  • Incident response plan, including breach notification timelines and communication protocols
  • Encryption standards: AES-256 at rest, TLS 1.2 minimum in transit, and key management practices (HSM or KMS usage)
  • Cybersecurity frameworks in scope: NIST CSF, CIS Controls, or equivalent

For vendors operating in regulated environments, also confirm DORA readiness, HIPAA BAA execution, FedRAMP authorization level, or PCI DSS scope alignment depending on your industry.

Technical Architecture and Integration Stability

This is where IT vendor due diligence diverges most sharply from a standard procurement review, and where most teams underinvest. A vendor can pass every compliance check and still introduce instability into your environment.

Request and review:

  • Architecture diagrams showing data flows, multi-region topology, and high-availability configuration
  • API documentation: versioning policy, deprecation timelines, rate limits, and backward compatibility guarantees
  • Identity and access management (IAM) patterns: SSO support, SAML 2.0 or OIDC compliance, SCIM provisioning, and role-based access controls
  • Logging and observability: what audit trails does the vendor provide, in what format, and are they exportable to your SIEM?
  • Backup configuration, RTO (Recovery Time Objective), and RPO (Recovery Point Objective) commitments, tested not just documented

Run a proof-of-concept in your own environment before signing. Test the happy path, a failure scenario, and at least one integration edge case. A demo environment is not evidence of production stability.

SLA Terms and Operational Risk

SLA language is where vendor commitments either hold or evaporate. Review these terms with your legal and infrastructure teams together.

Verify:

  • Uptime SLA percentage and how downtime is calculated (excluding scheduled maintenance or not)
  • Credit mechanisms: what do you actually receive if the SLA is breached, and is it proportional to the impact?
  • Support coverage hours, response time SLAs by severity tier, and named escalation paths
  • Release cadence and change management protocols: how much notice do you get before breaking changes?
  • Webhook delivery guarantees and retry logic for event-driven integrations

Data Handling and Regulatory Compliance

Your vendor risk assessment is incomplete without understanding exactly where your data goes and who can access it.

Confirm:

  • Data Processing Agreement (DPA) execution and subprocessor list with geographic locations
  • Data residency commitments and any cross-border transfer mechanisms (SCCs, BCRs)
  • Retention and deletion SLAs: how long is data held, and what is the verified deletion process post-contract?
  • GDPR lawful basis documentation, Data Subject Request (DSR) handling procedures, and breach notification timelines (72 hours under GDPR)
  • For AI-enabled vendors: training data transparency, model provenance, and whether your data is used to train shared models

Reputational and Concentration Risk

Check what is publicly known about the vendor that they would not volunteer.

Review:

  • Breach history: past security incidents, disclosed vulnerabilities, and regulatory actions
  • Customer references from organizations with a comparable technical environment to yours
  • Subcontractor and fourth-party dependencies: who does your vendor rely on, and have you assessed those dependencies?
  • Market concentration: if this vendor is acquired, sunset, or pivots, what is your exit path and how long does migration realistically take?

Document your findings for each category. Every Tier 1 engagement should produce a decision memo that records what was found, what risks were accepted, and who approved the exceptions.

IT Vendor Due Diligence Checklist
Work through each category by tier. Tick items as you go β€” progress is tracked per tab.
Tier scope: All tiers. Start here before any other review.
0 of 5 completed
βœ“
Certificate of incorporation, business license, and corporate structure
βœ“
Last two years of audited financial statements (or financial health summary for private vendors)
βœ“
Customer concentration check: flag any vendor deriving more than 40% of revenue from a single customer
βœ“
Key personnel backgrounds and any active litigation or regulatory enforcement actions
βœ“
Sanctions list checks (OFAC, EU, UN) and PEP screenings for executive leadership
Tier scope: Tier 1 and Tier 2.
0 of 6 completed
βœ“
SOC 2 Type II (not Type I): verify audit period, scope boundaries, and auditor exceptions
βœ“
ISO 27001: review the Statement of Applicability (SoA), not just the certificate
βœ“
Penetration test results from the last 12 months, conducted by an independent third party
βœ“
Incident response plan with breach notification timelines and communication protocols
βœ“
Encryption: AES-256 at rest, TLS 1.2 minimum in transit, HSM or KMS key management
βœ“
Regulated environments: confirm DORA readiness, HIPAA BAA, FedRAMP level, or PCI DSS scope as applicable
Tier scope: Tier 1 only. This is where IT due diligence diverges from procurement.
0 of 5 completed
βœ“
Architecture diagrams: data flows, multi-region topology, high-availability configuration
βœ“
API documentation: versioning policy, deprecation timelines, rate limits, backward compatibility guarantees
βœ“
IAM patterns: SSO support, SAML 2.0 or OIDC, SCIM provisioning, role-based access controls
βœ“
Logging and observability: audit trail format, exportability to SIEM, retention period
βœ“
RTO and RPO commitments: documented and tested under real failure conditions, not just stated
Tier scope: Tier 1 and Tier 2. Review with legal and infrastructure teams together.
0 of 5 completed
βœ“
Uptime SLA percentage and how downtime is calculated β€” does scheduled maintenance count against it?
βœ“
Credit mechanisms: what you receive if the SLA is breached and whether it is proportional to the impact
βœ“
Support coverage hours, response time SLAs by severity tier, and named escalation paths
βœ“
Release cadence and change management protocols: advance notice before breaking changes
βœ“
Webhook delivery guarantees, retry logic, and compensation mechanisms for event-driven integrations
Tier scope: Tier 1 and any vendor handling personal data regardless of tier.
0 of 5 completed
βœ“
Data Processing Agreement (DPA) executed, subprocessor list obtained with geographic locations
βœ“
Data residency commitments and cross-border transfer mechanisms (SCCs, BCRs) confirmed
βœ“
Retention and deletion SLAs: how long data is held, and verified deletion process post-contract
βœ“
GDPR lawful basis documentation, DSR handling procedures, 72-hour breach notification compliance
βœ“
AI-enabled vendors: training data transparency, model provenance, confirmation your data is not used for shared model training
Tier scope: Tier 1 and Tier 2. Check what the vendor wouldn't volunteer.
0 of 4 completed
βœ“
Breach history: past security incidents, disclosed vulnerabilities, and regulatory actions
βœ“
Customer references from organizations with a comparable technical environment
βœ“
Subcontractor and fourth-party dependencies: who the vendor relies on and whether those have been assessed
βœ“
Exit path: data export format, portability SLAs, and migration timeline if vendor is acquired or shut down

‍

15 Questions Every IT Leader Should Ask a Vendor

The questions below are designed to be asked directly in vendor conversations, RFP responses, or due diligence calls. Vague answers to any of these are themselves a signal.

Financial and Business Stability

1. What percentage of your revenue comes from your three largest customers, and what happens to our contract and our data if you are acquired or wind down?

2. When were your financials last independently audited, and can you share the summary?

Security and Compliance‍

3. What is the scope of your SOC 2 Type II audit, and what exceptions did the auditor note?

4. How frequently do you conduct third-party penetration tests, and can you share the most recent executive summary?

5. Walk me through how you would notify us of a security breach, and what your internal response timeline looks like.

Technical Architecture and Integration‍

6. What is your API versioning and deprecation policy, and how much notice do customers receive before a breaking change?

7. What SSO protocols do you support, and how is SCIM provisioning handled for user lifecycle management?

8. What audit logs do you expose, in what format, and can they be forwarded to an external SIEM?

9. What are your documented RTO and RPO, and when were they last tested under real failure conditions?

SLA and Operational Commitments‍

10. How is uptime calculated in your SLA, and does scheduled maintenance count against it?

11. What are your webhook delivery guarantees, retry logic, and compensation mechanisms if delivery fails?

12. What is your severity classification system for support tickets, and who is our named escalation contact?

Data Handling and Regulatory Compliance‍

13. Where is our data stored, who are your active subprocessors, and under what legal mechanism is data transferred cross-border?

14. What is your verified deletion process after contract termination, and what SLA applies to it?

15. If your product uses AI or machine learning, is our data used to train shared models, and where is that documented in the contract?

‍

Common Pitfalls in Vendor Due Diligence

The vendor due diligence best practices in the previous sections are only useful if you avoid the mistakes that render them ineffective. These five come up repeatedly in failed vendor relationships.

Treating certifications as current truth. SOC 2 reports expire. An audit completed 18 months ago against a narrower product scope tells you little about today's posture. Always check the audit date, the scope boundary, and the auditor's exceptions before accepting a certificate as evidence.

Running a PoC in the vendor's environment. Vendor-managed sandboxes are optimized to perform well. A proof-of-concept only generates useful signal when it runs in your infrastructure, against your integration points, with your failure scenarios injected.

Missing data scope creep. A vendor onboarded as Tier 3 with no access to sensitive data can quietly become a Tier 1 exposure when a new product integration is added mid-contract. Re-tier vendors whenever their data access or system integration depth changes.

Incomplete stakeholder alignment. Security, legal, finance, and data teams each see a different slice of vendor risk. A due diligence process owned entirely by IT or procurement misses the exposures the other functions would have caught.

No documented exit terms. Evaluate the vendor's data export format, portability SLAs, and assisted transition commitments before you sign. Migration difficulty compounds every other risk.

5 Pitfalls That Undermine Vendor Due Diligence
Each one has a specific fix. Click to expand.
1
Treating certifications as current truth
β–Ύ

SOC 2 reports expire. An audit completed 18 months ago against a narrower product scope tells you little about today's posture. Certifications are snapshots, not continuous assurances.

Fix: Always check the audit date, the scope boundary, and the auditor's exceptions before accepting a certificate as evidence. If it's older than 12 months, ask for the renewal timeline.
2
Running a PoC in the vendor's environment
β–Ύ

Vendor-managed sandboxes are optimized to perform well. They are pre-warmed, pre-configured, and designed to make the demo impressive. They tell you very little about how the product will behave in your environment, under your load, with your integrations.

Fix: Run the PoC in your own infrastructure, against your integration points, with your failure scenarios injected. Test the happy path, a failure scenario, and at least one edge case.
3
Missing data scope creep
β–Ύ

A vendor onboarded as Tier 3 with no access to sensitive data can quietly become a Tier 1 exposure when a new product integration is added mid-contract. This happens more often than teams expect, especially with SaaS tools that expand their feature set.

Fix: Re-tier vendors whenever their data access or system integration depth changes. Build a review step into your change management process for any new integration request involving an existing vendor.
4
Incomplete stakeholder alignment
β–Ύ

Security, legal, finance, and data teams each see a different slice of vendor risk. Security catches posture gaps. Legal catches contractual exposure. Finance catches concentration and viability risk. Data teams catch privacy obligations. A process owned by one function misses the rest.

Fix: Define a RACI before the review begins. Assign named owners from security, legal, finance, and data for Tier 1 engagements. Set decision gates before the contract moves forward.
5
No documented exit terms
β–Ύ

Exit difficulty is one of the most underestimated risks in vendor relationships. When a vendor is acquired, changes pricing materially, or degrades in quality, your options narrow dramatically if you didn't negotiate exit terms upfront. Migration costs and data portability issues compound every other risk.

Fix: Evaluate the vendor's data export format, portability SLAs, and assisted transition commitments before you sign. Test export formats during the PoC. Document termination for convenience clauses and data deletion timelines in the contract itself.

‍

When to Reassess a Vendor You Already Work With

Organizations experience an average of 12 third-party breaches per year, yet 45% of security teams receive updates on vendor risk posture only annually or never. The due diligence you completed at onboarding degrades the moment a vendor ships a new release, acquires a company, or rotates their infrastructure team.

Reassess any existing vendor when:

  • Their SOC 2 or ISO 27001 certificate is approaching its anniversary and no renewal report has been shared
  • A security incident, public breach disclosure, or significant drop in their third-party security rating occurs
  • They announce an acquisition, are acquired themselves, or undergo a material leadership change
  • They add new subprocessors, expand data processing scope, or migrate infrastructure to a different region
  • Your own regulatory obligations change in a way that affects what you require from vendors
  • Contract renewal is within 90 days β€” this is your strongest point of leverage

Treat reassessment as a scheduled operational task, not a reaction to a problem that has already happened.

‍

What Good Looks Like

A mature vendor due diligence process does not feel like a gate. It feels like a standard. Vendors who take security, transparency, and contractual accountability seriously will answer your questions directly, provide documentation without a week of follow-up, and welcome a PoC in your environment. The ones who resist, deflect, or offer a demo instead of evidence are telling you something.

Tier your vendors. Ask the hard questions before the contract is signed. Reassess when circumstances change. Document every decision. The IT leaders who treat vendor due diligence as a continuous discipline rather than a procurement formality are the ones who avoid the breach, the failed migration, and the boardroom conversation that follows.

Looking for IT partners?

Find your next IT partner on a curated marketplace of vetted vendors and save weeks of research. Your info stays anonymous until you choose to talk to them so you can avoid cold outreach. Always free to you.

Get started

FAQ

What is vendor due diligence?

Vendor due diligence is the disciplined process of investigating a third-party vendor's technical, security, operational, financial, and legal posture before entering a contract, and on a continuous basis throughout the relationship. For IT leaders, it covers financial stability, security compliance (SOC 2, ISO 27001, NIST), technical architecture, SLA terms, data handling practices, and reputational risk. The goal is to verify that the vendor's actual posture matches their claims before your infrastructure, data, or users depend on them.

How do you conduct vendor due diligence in regulated industries?

In regulated industries, vendor due diligence must map to your specific compliance obligations alongside standard security checks. For healthcare, confirm HIPAA Business Associate Agreement (BAA) execution and PHI segmentation practices. For financial services, assess DORA readiness, SOX scope alignment, and PCI DSS cardholder data isolation. For government or public sector workloads, verify FedRAMP authorization level. In all cases, obtain the vendor's subprocessor list, confirm cross-border data transfer mechanisms (SCCs or BCRs), and document your findings for audit purposes.

What is the best approach to vendor due diligence at scale?

The most effective approach is risk-based tiering. Assign vendors to three tiers by data sensitivity and integration depth, then apply proportionate scrutiny: full architecture reviews and PoC for Tier 1, security and SLA review for Tier 2, and a basic compliance check for Tier 3. Standardize evidence requests through a repeatable questionnaire, use third-party security ratings for continuous monitoring, and automate reassessment triggers β€” certificate expirations, incident disclosures, and subprocessor changes β€” rather than relying on manual scheduling.

How do companies document vendor due diligence for regulators?

Each Tier 1 vendor engagement should produce a decision memo that records what was assessed, what evidence was collected, what risks were identified, which risks were accepted, and who approved the exceptions. Supporting documentation includes the vendor's SOC 2 Type II report, penetration test summary, completed Data Processing Agreement, subprocessor list, and any contractual security exhibits. This package forms your audit trail and demonstrates to regulators that due diligence was structured, repeatable, and appropriately authorized.

How do you validate a new vendor quickly without compromising due diligence?

Start with vendor tiering. If the vendor qualifies as Tier 3 (no sensitive data access, no core system integration), a lightweight review covering company verification, basic compliance check, and contract terms is both sufficient and defensible. For Tier 2 vendors under time pressure, run a compressed review: security posture, SLA validation, DPA execution, and a focused legal review of data ownership and termination terms. Reserve the full process for Tier 1. Speed is not the problem β€” applying the same depth to every vendor regardless of risk is.