The operational procedure that implements the Third-Party Management Policy.

When to run an assessment

A vendor risk assessment is required before:
  • Sharing or transmitting Confidential data to a third party.
  • Granting a third party access to Neuroscale production systems or networks.
  • Entering into a contract that involves processing customer data.
For low-risk vendors (no Confidential data, no production access, public information only), a lightweight review is sufficient.

Process

  1. Intake. Requestor opens a vendor request via the Vendor Risk Assessment intake form. Captures: vendor name, purpose, data accessed, integrations, contract value.
  2. Tiering. Security tiers the vendor — High / Medium / Low — based on data sensitivity and integration depth.
  3. Diligence.
    • High — full questionnaire (SIG Lite or equivalent), SOC 2 / ISO 27001 review, data-processing addendum (DPA), penetration-test summary if available.
    • Medium — SOC 2 review, DPA where personal data is involved.
    • Low — review of public trust page; minimal documentation.
  4. Approval. the CISO and CFO approve before contract signature.
  5. Onboarding. IT provisions integration; vendor is added to the Vendor Inventory.
  6. Re-review. High-tier vendors are re-reviewed annually; medium-tier every 2 years.

Documentation kept on file

  • Signed agreement (MSA / DPA / SOW).
  • Latest SOC 2 / ISO 27001 / equivalent attestation.
  • Completed security questionnaire.
  • Tier rationale and approval.
  • Evidence of annual re-review.

Vendor inventory

The current vendor inventory lives at the Vendor Inventory page (mirrored to Vanta for continuous monitoring).

Version history

VersionDateDescriptionAuthorApproved by
1.0May 8, 2026Initial versionCameron WolfeIshan Jadhwani