February 15, 2025 Strategy

For over a decade, the security questionnaire has been the backbone of third-party risk management. Organizations send vendors a spreadsheet or portal-based form — often hundreds of questions long — asking them to self-report their security controls, certifications, and incident history. The vendor fills it out, someone on the TPRM team reviews the responses, assigns a risk rating, and files it away. This process is then repeated annually, if at all. It is the dominant model for vendor risk assessment worldwide, and it is fundamentally broken.

The evidence is not anecdotal. Industry research consistently shows that organizations do not trust the data they collect through questionnaires, yet they continue to rely on the process because they lack a better alternative — or believe they do. According to industry surveys and analyst research, the trust deficit in questionnaire-based assessments is staggering: as few as 4% of organizations report high confidence in the accuracy of vendor questionnaire responses. The remaining 96% are building risk decisions on a foundation they themselves do not believe in.

The Six Fundamental Failures of Questionnaire-Only TPRM

1. Self-Reported Data Is Inherently Unreliable

The most obvious problem with vendor questionnaires is that they rely entirely on the vendor's own reporting. This is the fox guarding the henhouse. Vendors have every incentive to present their security posture in the most favorable light possible, and no mechanism exists to independently verify most of their claims. A vendor can check "yes" next to "Do you encrypt data at rest?" without specifying the algorithm, key management practices, or scope of encryption. They can claim to have an incident response plan without revealing that it was last tested three years ago.

This is not a hypothetical concern. The SolarWinds breach in 2020 demonstrated that a vendor could pass security assessments and maintain SOC 2 certification while their build environment was actively compromised. The MOVEit breach in 2023 showed that a widely trusted file transfer vendor could have a critical zero-day vulnerability exploited at scale. In neither case would a questionnaire have identified the risk.

2. Point-in-Time Snapshots Miss Ongoing Risk

A vendor questionnaire captures the vendor's security posture at a single moment. But security is not static. A vendor assessed as "low risk" in January may suffer a breach in March, change their cloud infrastructure in June, or lay off half their security team in September. An annual questionnaire creates a 364-day blind spot during which the organization has no visibility into changes in the vendor's risk profile. Even quarterly assessments leave gaps of nearly 90 days.

The average time from breach to detection is approximately 204 days, according to IBM's Cost of a Data Breach Report 2023. This means that even if a vendor is breached the day after completing a questionnaire, the compromise may not be discovered until long after the next assessment cycle, if the vendor discovers it at all.

3. Questionnaire Fatigue Degrades Quality

Large enterprises may manage hundreds or thousands of vendor relationships. Each vendor may receive questionnaires from dozens of their own customers. The result is questionnaire fatigue on both sides. TPRM teams rush through reviews to meet deadlines. Vendors copy and paste responses from previous assessments without updating them. In some cases, vendors maintain a single "master questionnaire" that they repurpose for every customer, regardless of the specific questions asked.

The Vanta 2024 State of Trust Report found that TPRM teams spend enormous amounts of time on manual assessment processes, with significant portions of that time devoted to chasing vendors for responses and reviewing questionnaires that often contain outdated or generic information. When a 200-question questionnaire arrives, the rational response for an overworked vendor security team is to answer it as quickly as possible, not as accurately as possible.

4. Qualitative Risk Ratings Lack Decision Value

After the questionnaire is reviewed, most TPRM programs assign a qualitative risk rating: High, Medium, or Low. These ratings are subjective, inconsistent across assessors, and provide almost no decision support. What does "medium risk" actually mean? Does it mean the vendor is likely to be breached? That the impact would be moderate? That someone on the assessment team felt uncertain? Without quantification, these ratings cannot be compared across vendors, cannot inform budget decisions, and cannot be meaningfully communicated to a board of directors.

5. No Accountability for Accuracy

Vendor questionnaires rarely include contractual consequences for inaccurate responses. If a vendor claims to have multi-factor authentication deployed across all systems and later suffers a breach through a single-factor account, there is typically no recourse tied to the questionnaire response. The questionnaire is treated as a compliance artifact, not a binding representation. This further reduces the vendor's incentive to provide accurate, detailed responses.

6. They Miss Nth-Party and Concentration Risk Entirely

Standard questionnaires focus on the vendor's own security controls. They rarely ask about the vendor's vendors — the fourth parties, fifth parties, and shared dependencies that create concentration risk across the supply chain. The CrowdStrike outage in July 2024, which disrupted an estimated 8.5 million Windows devices globally, demonstrated that technology concentration risk can cascade across industries regardless of any individual vendor's security posture. A questionnaire asking a vendor "Do you have endpoint protection?" would have received a perfectly satisfactory answer right up until the endpoint protection itself caused a global outage.

The Core Problem: Questionnaire-only TPRM gives organizations the appearance of managing vendor risk without actually reducing it. Teams spend hundreds of hours on a process that produces data they do not trust, ratings that do not inform decisions, and snapshots that are obsolete before the file is closed. It is compliance theater masquerading as risk management.

What Should Replace It: A Multi-Signal Approach to Vendor Risk

The solution is not to eliminate questionnaires entirely — they still serve a purpose for understanding a vendor's stated controls and policies. The solution is to stop relying on questionnaires as the primary or sole input to vendor risk decisions. Modern TPRM requires a multi-signal approach that combines several complementary methods:

Continuous Monitoring with Security Rating Services

Security Rating Services (SRS) like Shodan, UpGuard, SecurityScorecard, and BitSight provide continuous, external-facing assessments of a vendor's security posture. They scan for exposed services, known vulnerabilities, misconfigured DNS, SSL/TLS weaknesses, and other observable indicators. Unlike questionnaires, SRS data is objective, continuous, and does not depend on vendor self-reporting. SRS has limitations — it provides only an external view and can produce false positives from CDNs or WAFs — but it fills the critical gap between annual assessments with real-time visibility.

Positive Vendor Relationships Over Adversarial Assessments

Traditional TPRM treats vendors as adversaries to be interrogated. A more effective approach builds collaborative relationships where vendors proactively share threat intelligence, notify customers of incidents promptly, and engage in joint security exercises. Vendors who trust their customers share more than vendors who feel they are being audited. This requires a cultural shift from compliance enforcement to mutual risk reduction.

Breach Notification Tracking and Incident History

Rather than asking vendors whether they have experienced a breach (and hoping for an honest answer), organizations should independently track vendor breach notifications, regulatory filings, and public incident reports. A vendor's actual incident history is a far better predictor of future risk than their self-assessed maturity rating. Tools that aggregate breach data from SEC filings, data protection authority notifications, and news sources provide an evidence-based view of vendor risk.

Technology Concentration and Nth-Party Risk Analysis

Modern TPRM must map the technology stacks across the vendor portfolio to identify concentration risk. If five critical vendors all run on the same cloud provider, use the same identity platform, or depend on the same open-source library, a single failure in that shared dependency can cascade across multiple vendor relationships simultaneously. This kind of systemic risk is invisible to questionnaires but essential to organizational resilience.

FAIR Risk Quantification

The FAIR (Factor Analysis of Information Risk) framework converts qualitative vendor risk into financial terms: Annualized Loss Expectancy (ALE), probable loss magnitude, and threat event frequency. This gives boards and executives the decision support they need. Instead of "this vendor is medium risk," FAIR analysis says "this vendor relationship carries an estimated $2.4 million in annualized loss exposure, which can be reduced to $800,000 with these specific controls." That is actionable. That justifies budget. That drives real risk reduction.

Evidence-Based Control Verification

Where questionnaires ask "do you have this control?", evidence-based assessment asks "show me." This includes reviewing SOC 2 Type II reports (not just certifications), penetration test summaries, vulnerability scan results, configuration compliance reports, and business continuity test results. Evidence does not eliminate the possibility of misrepresentation, but it raises the bar significantly above a checkbox.

Shared Threat Intelligence

Organizations and their vendors face many of the same threats. Sharing indicators of compromise, attack patterns, and vulnerability information creates mutual benefit and strengthens the security of the entire supply chain. Industry-specific ISACs (Information Sharing and Analysis Centers) provide a framework for this kind of collaboration, and TPRM programs should actively participate in and encourage vendor participation in these sharing communities.

Approach Questionnaire-Only TPRM Multi-Signal TPRM
Data Source Vendor self-reporting SRS + evidence + monitoring + vendor engagement
Frequency Annual or quarterly Continuous with periodic deep dives
Trust Model Trust but no verification Trust but verify with objective data
Risk Rating Qualitative (H/M/L) Quantitative (ALE in dollars)
Concentration Risk Not assessed Mapped across vendor portfolio
Nth-Party Visibility None Technology stack mapping
Vendor Relationship Adversarial (audit/interrogation) Collaborative (shared risk reduction)
Board Communication "We assessed 200 vendors this year" "Our vendor portfolio carries $14M in quantified risk exposure"
TPRM Lesson Learned: The questionnaire is not the problem — questionnaire-only TPRM is the problem. Organizations must evolve from a single-source, point-in-time, self-reported assessment model to a multi-signal, continuous, evidence-based approach that combines security rating services, vendor relationship management, breach tracking, concentration risk analysis, FAIR quantification, and collaborative threat intelligence. The goal is not to collect more data but to collect better data and convert it into actionable risk decisions. Fair TPRM was purpose-built for this approach, integrating Shodan and UpGuard for continuous monitoring, FAIR risk quantification for board-level reporting, and vendor lifecycle management for relationship-based engagement.

The Path Forward

Abandoning questionnaire-only TPRM does not mean abandoning structure or rigor. It means recognizing that a single data source — especially a self-reported one — cannot support the risk decisions that modern organizations need to make. The vendors that organizations depend on are too numerous, too interconnected, and too dynamic to be assessed through a spreadsheet once a year.

The organizations that will manage third-party risk most effectively in the coming years will be those that treat vendor risk the way they treat other business-critical functions: with continuous measurement, quantified outcomes, and relationships built on transparency rather than compliance theater. The questionnaire can remain one input among many. It should never again be the only one.

Protect Your Organization from Third-Party Risk

Fair TPRM is a free, open-source platform for vendor risk management, GRC compliance, and FAIR risk quantification.

Free Demo Download Source

Sources & References

  1. The State of Trust Report 2024: Trends in Security, Compliance, and Trust - Vanta, 2024
  2. The Complete Guide to Third-Party Risk Management - Safe Security, 2024
  3. Cost of a Data Breach Report 2023 - IBM Security and Ponemon Institute, 2023
  4. What is FAIR? Factor Analysis of Information Risk - FAIR Institute
  5. NIST SP 800-161r1: Cybersecurity Supply Chain Risk Management Practices - National Institute of Standards and Technology, 2022
  6. Gartner Market Guide: IT Vendor Risk Management - Gartner