Third-Party Risk

Vendor Due Diligence Techniques: What to Verify When the Questionnaire Comes Back

May 7, 2026 Rebecca Leung
Table of Contents

TL;DR

  • A completed vendor questionnaire is self-reported data. Verification — through document review, independent research, and for critical vendors, site visits — is what separates a defensible TPRM program from a check-the-box exercise.
  • The 2023 OCC/FDIC/Fed Interagency Guidance sets a risk-based standard: due diligence depth must match vendor criticality. Critical (Tier 1) vendors require extensive document review, including SOC 2 Type II reports, financials, and pen test results. Tier 3 vendors may get attestation only.
  • Six red flags consistently escape questionnaire answers: adverse media, financial distress, SOC 2 scope carve-outs, stale penetration test dates, key-person concentration, and undisclosed subcontractors.
  • Documentation is the difference between a defensible program and an exam finding. Capture your reasoning at every step — tier decision, document review notes, independent verification, and the approval decision with date and approver.

The questionnaire came back. Every box is checked. Your vendor scores a 92/100 on the risk tool. The account manager is helpful and the price is right.

Now what?

This is where most TPRM programs stop — and where regulators expect you to keep going. A completed vendor questionnaire is the starting point for due diligence, not the finish line. Vendors answer based on what they believe about themselves, or what they want you to believe. There’s no verification mechanism built into a questionnaire. Security rating firms that measure vendor posture independently routinely find gaps between self-reported scores and measured performance.

The 2023 Interagency Guidance on Third-Party Relationships from the OCC, FDIC, and Fed is explicit: banking organizations should “consider requesting and reviewing documentation that supports vendor representations,” including audit reports, certifications, and financial statements. “We sent them a questionnaire” is not a due diligence program. It’s a data collection activity.

Here’s how to actually verify what you’ve been told.


Scale Your Verification to the Vendor’s Risk Tier

Not every vendor gets the same scrutiny. That’s not laziness — it’s the right approach. The Interagency Guidance is clear that due diligence depth must be “commensurate with the risk and criticality of the activity.” Applying Tier 1 rigor to your logo design vendor wastes resources; applying Tier 3 treatment to your core banking processor creates regulatory exposure.

A three-tier framework works for most organizations:

TierCriteriaVerification Depth
Tier 1 – CriticalAccess to sensitive customer data, core business process dependency, regulatory reporting involvementFull document package, independent research, site visit or virtual walkthrough for new vendors
Tier 2 – StandardMaterial operational support, some data access, meaningful business impact if disruptedDocument review (SOC 2, financials), security rating, adverse media check
Tier 3 – Low RiskCommoditized service, no data access, easily replaceableAttestation, basic screening

Your vendor risk tiering methodology determines what tier a vendor lands in before you start due diligence — which determines what you need to verify. If the tier is wrong, the verification depth will be wrong.


The Six Document Categories and How to Read Each One

1. SOC 2 Type II Reports

The SOC 2 Type II is the closest thing the industry has to an independent verification of a vendor’s security and availability controls. But most TPRM teams treat SOC 2 reports as a binary pass/fail (“do they have one?”) rather than actually reading them.

What to look for:

Scope and coverage dates. A SOC 2 report covers a specific time period — often six or twelve months. A report dated 14 months ago with a six-month coverage window leaves an eight-month gap where you have no independent visibility. Request a bridge letter if coverage is more than 12 months old.

Which Trust Service Criteria apply. Security is always included. But if you’re buying from a SaaS vendor, you should ask whether Availability is in scope. If they handle financial data, Confidentiality matters. If they process regulated health data, Privacy. A narrow scope — “Security only, one system” — should raise questions about what wasn’t covered.

Exceptions and qualified opinions. The management response to exceptions matters. A vendor with two exceptions and a credible remediation plan is better positioned than a vendor with no exceptions in a report that covered almost nothing. Read the complementary user entity controls (CUECs) — some controls only work if your organization does its part too.

Type I vs. Type II. A Type I report says controls were designed correctly at a point in time. A Type II says they were operating effectively over a period. For critical vendors, Type II is the standard.

2. Financial Statements

A vendor can check every security box and still be out of business in 18 months. Financial viability is a due diligence requirement under the Interagency Guidance, and it’s one that many teams skip because it feels like finance’s problem, not risk’s.

For critical vendors, request the two most recent years of audited financials — or at minimum, year-end financials with a management discussion. Look for:

  • Revenue trends. Consistent decline in a SaaS vendor’s recurring revenue is a concentration-risk signal.
  • Customer concentration. If one client represents 40% of revenue and that client is also a competitor, viability risk is real.
  • Cash runway and debt load. Startups and mid-market vendors especially. A fintech with 8 months of runway and a major contract up for renewal next quarter may not survive to renew yours.
  • Audit qualifications. A going-concern qualification from the auditor is not a routine footnote.

3. Penetration Test Results

A questionnaire might ask “do you conduct annual penetration testing?” A “yes” answer tells you almost nothing. What you actually need to know: who conducted it, when, what scope was covered, and what findings came out of it.

Request the penetration test executive summary (not the full report with exploit details — that’s a security risk to share) from the past 12 months. Evaluate:

  • Tester independence. Internal pen tests don’t count. The tester should be an independent third party.
  • Test age. Over 12 months is stale for Tier 1 vendors. Some financial services contracts now specify 6-month cadences for critical infrastructure vendors.
  • Scope coverage. Did the test cover the systems that touch your data specifically?
  • Finding remediation status. High and critical findings should have documented remediation or compensating controls. Unresolved criticals are a negotiating point and potentially a deal-breaker.

4. Insurance Certificates

Request a certificate of insurance (COI) showing active coverage for: general liability, professional liability (errors and omissions), cyber liability, and workers’ compensation. For vendors with significant data access, minimum cyber liability coverage should be in the $1–5M range depending on your data volumes, with your organization named as an additional insured.

Check expiration dates. A COI is a point-in-time snapshot — coverage can be allowed to lapse after the certificate is issued. Consider contractual language requiring the vendor to notify you of any material change in coverage.

Vendors won’t voluntarily list their enforcement actions and consent orders in a questionnaire. Run independent checks through:

  • CFPB enforcement database for any fintech or consumer-facing vendors
  • SEC EDGAR for any public company vendors — look for material legal proceedings disclosures
  • State licensing portals if the vendor is a licensed entity (money transmitter, insurance, etc.)
  • Adverse media search — Google, LexisNexis, or a purpose-built screening tool. Search the company name plus principals’ names with terms like “fraud,” “sanction,” “lawsuit,” “settlement,” “investigation”
  • OFAC and sanctions screening — especially for vendors with international operations or ownership

This step is quick and consistently catches things questionnaires miss. A vendor may truthfully answer “no material legal proceedings” while having a pattern of BBB complaints, state AG investigations, or former employee lawsuits that tell a different story about how the company operates.

6. Business Continuity Documentation

If a critical vendor goes offline for 72 hours, what happens to your operations? The Interagency Guidance specifically calls out business continuity as a due diligence factor. For Tier 1 vendors, request:

  • BCP/DR plan summary (not the full plan — an executive summary or attestation)
  • Most recent BCP test results and date of last full test
  • Recovery time objective (RTO) and recovery point objective (RPO) commitments for your specific services
  • Data backup frequency and restoration testing results

Compare their RTOs against your own recovery objectives. A vendor with a 24-hour RTO supporting a process where you’ve committed to a 4-hour internal RTO is a problem waiting to happen.


Red Flags That Don’t Appear in Questionnaire Responses

Six patterns consistently escape questionnaire-based due diligence:

1. Adverse media on principals, not the company. Vendors sanitize company answers but can’t control what’s searchable about their founders, executives, or key technical staff. A CTO with a prior securities fraud conviction won’t appear in the vendor questionnaire.

2. Financial distress signaling without a balance sheet. Even without audited financials, signals like mass layoffs (LinkedIn), significant leadership departure, office downsizing, or price-cutting behavior signal viability risk.

3. SOC 2 scope carve-outs for the exact systems you care about. “Our SOC 2 covers our main application” might exclude the API layer, the data warehouse, or the infrastructure tier that actually processes your data.

4. The 14-month pen test. Questionnaires ask “do you conduct penetration testing” — not “when was your last test completed.” Vendors with an 18-month gap will answer “yes.”

5. Undisclosed subcontractors with data access. The vendor you’re vetting may rely on a fourth party — a cloud data processor, a customer support platform, a background check vendor — that also touches your data. The Interagency Guidance requires visibility into subcontractor chains for critical vendors. Questionnaires rarely capture this adequately.

6. Key-person concentration. A five-person security team where the one person who built the entire infrastructure is also the CEO’s brother-in-law is a concentration risk. It doesn’t show up in a questionnaire.


When to Do a Site Visit or Virtual Walkthrough

For new Tier 1 vendors — particularly those with access to large volumes of sensitive data or involvement in critical business processes — a site visit or structured virtual walkthrough adds verification that documents can’t provide. You’re looking for evidence that stated controls are actually operational, not just documented.

A structured walkthrough covers: physical security controls (data center access, clean desk policy), personnel practices (security training evidence, background check documentation), operations center maturity (monitoring tools, incident response procedures), and a live demo of the access control and logging environment.

Virtual walkthroughs via screen share have become standard practice. They’re not as rigorous as on-site visits for a $50M cloud infrastructure dependency, but they’re far better than document review alone.


Documentation That Survives an Exam

The most common due diligence finding in OCC and FDIC examinations isn’t missing documents — it’s missing reasoning. Programs often collect documents but fail to document what they found, what they concluded, and who approved the relationship.

A defensible due diligence file for a critical vendor includes:

  1. Risk tier assignment with documented rationale
  2. Completed questionnaire with date received and version
  3. Documents requested vs. documents received (with follow-up notes on gaps)
  4. Review notes for each document category — what you found, any concerns noted
  5. Independent verification steps taken (security rating pull date, adverse media search date and results, financial analysis notes)
  6. Overall risk rating with supporting justification
  7. Approval decision — approver name, date, any conditions attached

The “conditions attached” item is underused. If a vendor’s penetration test is six months old and they’ve committed to sharing the new one within 30 days of completion, document that commitment and the follow-up trigger. That’s evidence of a functioning program, not a gap.


So What?

Questionnaire-based due diligence catches the vendors who aren’t paying attention. Document-based verification catches the vendors who are misrepresenting. Independent research catches the vendors who are optimistic about themselves. And structured walkthroughs catch the vendors who are well-intentioned but organizationally chaotic.

The OCC’s 2023 Interagency Guidance set a clear standard: due diligence rigor must match vendor risk. That’s not a compliance exercise — it’s the logical requirement for a program that’s supposed to protect you from the operational failures, data breaches, and compliance violations of companies you’ve chosen to rely on.

The practitioner reality: most TPRM programs are better at collecting questionnaire responses than at verifying them. The ones that hold up under examination — and more importantly, under an actual vendor failure — are the ones that treat the questionnaire return as the beginning of the process, not the end.

The RiskTemplates Third-Party Risk Management (TPRM) Kit includes a complete vendor due diligence document request checklist, risk tiering matrix, due diligence questionnaire, scorecard template, and approval documentation framework — built to 2023 interagency guidance standards.


Further Reading

Sources:

Need the working template?

Start with the source guide.

These answer-first guides summarize the required fields, evidence, and implementation steps behind the templates practitioners search for.

Frequently Asked Questions

What is vendor due diligence in third-party risk management?
Vendor due diligence is the process of verifying a third party's ability to perform contracted services safely, securely, and in compliance with applicable laws and regulations — before you sign and on an ongoing basis. The 2023 OCC/FDIC/Fed Interagency Guidance on Third-Party Relationships defines it as one of five lifecycle stages (planning, due diligence, contract, ongoing monitoring, and termination). Due diligence covers financial condition, legal and regulatory compliance history, information security posture, business continuity capability, and key personnel qualifications. The depth of diligence required scales with the vendor's risk tier — critical vendors accessing customer data require far more rigorous assessment than low-risk, commoditized service providers.
Why isn't a completed questionnaire enough for vendor due diligence?
Questionnaires are self-reported — vendors answer based on what they believe is true (or what they want you to believe). There's no inherent verification mechanism. Security researchers have found that vendor self-reported security scores frequently diverge from independently measured scores, with vendors consistently rating themselves higher on maturity than outside assessment tools find. Regulators know this. The 2023 Interagency Guidance explicitly states that banking organizations should consider requesting and reviewing documentation that supports vendor representations, including audit reports, certifications, and financial statements. Examiners specifically look for evidence that you went beyond the questionnaire.
What documents should I request during vendor due diligence?
The standard document package for a Tier 1 (critical) vendor includes: SOC 2 Type II report (within the past 12 months), most recent audited financial statements or most recent year-end financials, penetration test summary (within the past 12 months, conducted by an independent third party), certificate of insurance with coverage details and policy limits, business continuity plan summary and most recent test results, regulatory exam findings or consent orders (if applicable), and key personnel background check confirmation. Tier 2 vendors typically receive a shorter list. Tier 3 vendors may be handled through attestation only. Document your rationale for each tier's scope.
What are the biggest red flags in vendor due diligence that questionnaire responses miss?
Six categories of red flags that rarely surface in questionnaire answers: (1) Adverse media and litigation — a vendor can answer 'no material litigation' and still have a pattern of customer disputes, employment claims, or regulatory sanctions you'd find in a news search; (2) Financial distress signals — declining revenue, high customer concentration, or a stretch of operating losses that suggest viability risk; (3) SOC 2 exceptions and carve-outs — a clean questionnaire but a SOC 2 report full of qualified opinions or scope limitations; (4) Gaps between the last pen test date and current date — questionnaires don't ask 'when was your last test' in a way that surfaces an 18-month gap; (5) Key person dependency — no succession plan for the founder-CTO who built the entire security architecture; (6) Undisclosed subcontractors with their own data access.
How does the OCC 2023 Interagency Guidance change vendor due diligence requirements?
The 2023 Interagency Guidance (OCC Bulletin 2023-17, FDIC FIL-29-2023) replaced three separate agency guidance documents and established a unified framework. The core due diligence requirement is risk-based: the depth and rigor of due diligence must be commensurate with the risk and criticality of the activity supported by the third party. The guidance introduced explicit attention to concentration risk — asking whether a banking organization has excessive dependence on a small number of third parties. It also expanded due diligence to cover subcontractor chains (fourth-party risk) for critical vendors. The guidance was clear that outsourcing an activity doesn't outsource the accountability: a vendor's compliance failure is the bank's compliance failure.
What documentation of vendor due diligence do examiners actually want to see?
Examiners want to see a consistent, documented trail showing: (1) a risk tiering decision with rationale, (2) a completed questionnaire with date received, (3) the documents you requested and received (and any gaps where documents weren't provided), (4) your review of those documents with notes on exceptions or concerns, (5) independent verification steps taken (security ratings, adverse media, financial analysis), (6) a risk rating or approval decision with the approver name and date, and (7) any conditions attached to approval. The most common examiner criticism isn't that you missed something — it's that you didn't document your reasoning. If you can't show why you rated a vendor Tier 2 instead of Tier 1, the tier doesn't hold up.
Rebecca Leung

Rebecca Leung

Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.

Related Framework

Third-Party Risk Management (TPRM) Kit

Complete vendor risk management lifecycle from initial due diligence to ongoing oversight.

Immaterial Findings ✉️

Weekly newsletter

Sharp risk & compliance insights practitioners actually read. Enforcement actions, regulatory shifts, and practical frameworks — no fluff, no filler.

Join practitioners from banks, fintechs, and asset managers. Delivered weekly.