
The 7 Stages of the Vendor Risk Lifecycle (with RACI Matrix)
Introduction
Most vendor risk programs fail at the seams — the moments between stages when responsibility changes hands and something falls through the cracks. A ‘we assessed them last year’ never triggers a reassessment. An offboarded vendor’s access keys stay live. A SOC 2 expires, and no one updates the file.
A clear lifecycle — with explicit owners at each stage — is the single biggest fix. This post lays out the 7 stages of a modern vendor risk lifecycle and pairs each with a RACI assignment you can adapt on day one.
Stage 1 - Planning & scoping
Before you engage any vendor, define the business outcome, the data classifications they’ll handle, the systems they’ll access, and who will own the relationship internally. This is the stage most programs skip, and it’s why vendors arrive in security’s inbox already signed.
Outcome: a one-page engagement brief with risk-relevant fields populated.
Stage 2 - Inherent risk tiering
Score the vendor’s inherent risk (before any mitigating controls) using three dimensions: data sensitivity, business criticality, and access scope. Map to tiers (Critical / High / Medium / Low). The tier sets questionnaire depth and monitoring cadence.
Shortcut: regulated data + production access + single-source-of-truth status = Critical, automatically.
Stage 3 - Due diligence & assessment
Issue the appropriate questionnaire — a full SIG or CAIQ for Critical vendors, SIG Lite for High, a short internal questionnaire for Medium/Low. Collect and validate evidence: SOC 2 Type II, ISO 27001, pen test summary, DPA, insurance certificates, financial statements if material.
Modern AI-assisted platforms ingest SOC 2 PDFs, extract controls, and auto-populate 40–60% of your questionnaire — you review and finalize instead of retyping.
Stage 4 - Contracting
The assessment’s findings must translate into contract terms. Non-negotiables for Critical and High tiers:
1. Security and privacy schedules with specific control requirements.
2. Data Processing Agreement (GDPR Art. 28, DPDP equivalent).
3. Audit and evidence rights (at least annual refresh).
4. Breach notification SLA (e.g., 48–72 hours).
5. Sub-processor disclosure and consent.
6. Right to terminate for material security degradation.
7. Data return and destruction obligations at exit.
Stage 5 - Onboarding & integration
Provision least-privilege access. Enroll the vendor in your continuous monitoring program. Record residual risk in the risk register. Set renewal and reassessment dates in the platform so they trigger automatically.
Stage 6 - Ongoing monitoring
Continuous monitoring has three layers:
1. External security rating (BitSight, SecurityScorecard, or platform-native scoring).
2. Threat intel and OSINT — dark-web mentions, breach disclosures, adverse news, regulatory actions, leadership changes.
3. Periodic questionnaire refresh at the cadence set by tier.
Alerts should route to the business owner and security reviewer with a recommended action, not dump into an inbox.
Stage 7 - Offboarding
When the relationship ends (or merely when a service is retired), execute: access revocation, API key and SAML de-federation, data return or certified destruction, preservation of audit trail, and a written offboarding attestation.
RACI matrix across the lifecycle
R = Responsible, A = Accountable, C = Consulted, I = Informed. A good default — adjust to your org:
1. Stage 1 Planning — Business owner (A), Procurement (R), Security (C), Legal (C).
2. Stage 2 Tiering — Security (R/A), Business owner (C), Data-protection officer (C).
3. Stage 3 Assessment — Security (R/A), Vendor (R for responses), Privacy (C), Business owner (I).
4. Stage 4 Contracting — Legal (R/A), Procurement (R), Security (C), Privacy (C), Business owner (I).
5. Stage 5 Onboarding — IT/IAM (R), Business owner (A), Security (C).
6. Stage 6 Monitoring — Security (R/A), Business owner (C), Risk committee (I).
7. Stage 7 Offboarding — Business owner (A), IT/IAM (R), Legal (C), Security (C).
Frequently Asked Questions
How long should a full lifecycle assessment take?
Who owns the vendor relationship?
How do we prevent vendors from bypassing the process?
Should we reassess after a vendor breach?
What about mergers and acquisitions?
Ready to modernize your vendor risk program?
ShieldRisk AI’s workflow engine codifies this lifecycle out of the box — from intake to offboarding, with RACI-aware task routing and automatic reassessment triggers. Start a free pilot with 5 vendors.

