COMMENTARY: A security professional, bleary-eyed and caffeine-fueled, stares down a 20-page questionnaire packed with hundreds of questions. It’s the all-too-common reality of third-party risk management—a process buried under bureaucracy, where security questionnaires sent to vendors feel long and cumbersome.Just about everyone in the industry knows these questionnaires no longer work. Despite their ubiquity, most people on both sides of the table—those issuing the questionnaires and those completing them—agree they are far from effective at assessing risk.[SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Read more Perspectives here.]Standards like the Consensus Assessment Initiative Questionnaire (CAIQ) and Standardized Information Gathering (SIG) started with good intentions, but they’ve grown into large behemoths. By attempting to cover every possible security control, these questionnaires overwhelm respondents with hundreds of questions spanning countless control families. In our effort at comprehensive due diligence, security professionals have lost sight of what truly matters: the ability to identify and manag the risks relevant to specific use cases.
Why questionnaires are failing
Security questionnaires have been around for years, but their effectiveness has been rapidly diminishing. They were never designed to handle today’s complexities, and their shortcomings are now all-too-evident. Here are some of the highlights:- Static data: Security questionnaires offer only a snapshot of a vendor’s security posture at the moment they’re completed. They don’t account for ongoing changes, leaving buyers with outdated or incomplete information by the time a vendor relationship begins.
- Trust issues: Responses are self-reported, leaving buyers to take vendors at their word. Without a way to verify the information, trust becomes a gamble—and research shows that only 34% of third-party risk management professionals trust questionnaire responses.
- Superficial evaluations: Completing a questionnaire often becomes a box-checking exercise. Vendor partners who simply fill out questionnaires are labeled “secure,” with little effort made to verify the responses or request improvements where needed.
- Resource strain: Completing questionnaires presents an enormous burden for security teams. Gathering data, routing approvals, and addressing hundreds of questions for every prospect can take 5-15 hours per questionnaire. Multiply that by dozens—or hundreds—of incoming requests each month, and it’s clear how much time gets being drained from already stretched teams.