If you're going through SOC 2 Type I or Type II, your auditor will dedicate a meaningful chunk of their assessment to how you manage third-party vendors. Most startups are underprepared. Here's what CC9.2 actually requires — and how to build a compliant vendor programme before your next audit call.
What the standard requires
SOC 2 is structured around five Trust Service Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. Vendor management sits within the Security criterion, specifically under the Common Criteria related to risk management.
The relevant control is CC9.2:
In plain English: you need to know who your vendors are, what risk they present, and what you’re doing about it. Not in theory — in documented, evidenced practice that an auditor can review and test.
CC9.2 is assessed during both Type I (point-in-time design effectiveness) and Type II (operational effectiveness over a period, typically six or twelve months) audits. For Type II in particular, you need to show not just that you have a vendor risk process, but that you’ve actually been operating it — consistently, repeatedly, with evidence.
What auditors actually check
SOC 2 auditors approach CC9.2 by looking for evidence across four interconnected areas. Understanding what they're testing — rather than just what the control says — is the key to being genuinely prepared rather than just paper-compliant.
A complete, up-to-date list of every vendor with access to your systems or data. Not a partial list. Not one that hasn't been touched since onboarding.
Documented evidence that you've assessed the risk each vendor presents — ideally with a risk classification, not just a list of names.
Evidence that your vendor relationships are governed by agreements that address security — not just commercial terms or click-through ToS.
A process for reviewing vendor risk regularly — with evidence it's actually happening. A policy document alone won't satisfy a Type II auditor.
Beyond these four areas, auditors are increasingly looking for vendor security certifications on file (do your critical vendors hold SOC 2 or ISO 27001 themselves?), evidence of how you handle vendor offboarding, and your process for assessing new vendors before giving them access to your systems.
Where startups go wrong
Most of the companies that struggle with CC9.2 aren't struggling because of a lack of effort — they're struggling because vendor management falls between roles. It's not quite engineering, not quite legal, not quite ops. The result is that it gets deprioritised until the audit prep sprint, when there's no time to do it properly.
“Our auditor walked us through CC9.2 on day one of our Type II readiness review. We had a vendor list in a spreadsheet that was six months out of date, no formal risk assessments, and three critical vendors without DPAs. We needed three more months and a proper system before we could proceed.”
What good looks like
You don't need a dedicated GRC team or a six-figure enterprise platform to satisfy CC9.2. What you need is a system that produces the evidence an auditor needs — consistently and without a lot of manual effort. Here's what that looks like in practice:
Every vendor with access to your systems or data should be in your register, classified by their risk level. Critical vendors — those that handle customer data, have direct system access, or are essential to service delivery — should be reviewed more frequently and in more depth than lower-risk tools. The classification doesn't need to be complex; a simple Critical/High/Medium/Low taxonomy is enough for most SOC 2 audits.
For each vendor, especially critical ones, you should be able to show a risk assessment — what data they access, what their security posture looks like, what certifications they hold, and what your residual risk judgement is. The assessment doesn't need to be exhaustive, but it needs to be documented, dated, and attributed. "We looked at this" is not evidence. "We assessed this on this date, the outcome was this, and it was reviewed by this person" is.
For any vendor handling personal data, you need a Data Processing Agreement (DPA). For critical vendors more broadly, your contracts should include provisions around security obligations, breach notification timeframes, and your right to audit or receive security certifications. Getting these in place is a one-time effort per vendor, but it’s one that many companies have avoided. The SOC 2 process is often the forcing function that gets it done.
Ongoing monitoring means something happened after the initial assessment. For Type II audits, you need to demonstrate that vendor risk is reviewed at least annually for all vendors and more frequently for critical ones — and that you have a mechanism for detecting and responding to material changes, such as a vendor suffering a security breach or coming under sanctions.
When a vendor relationship ends, you should be able to show what happened: access was revoked, data was retrieved or deleted per the contract terms, and the vendor was marked as inactive in your register. This doesn't require a complex process, but it does need to be documented and consistently followed.
How Vendorapp helps
Vendorapp is built around the evidence that SOC 2 auditors need. Everything it produces — vendor registers, risk assessments, monitoring records, contract registers, audit trails — is designed to be exportable and auditor-ready from day one.
Search 22M+ vendors by name or URL and add your entire vendor stack in minutes. Every vendor gets a profile with their risk classification, contact information, contract status, and full assessment history. Nothing falls through the cracks because there's no spreadsheet to maintain.
Vendorapp Intelligence scores every vendor automatically on security posture, data exposure, ESG risk, and sanctions exposure. Each assessment is timestamped and stored — giving you the dated, attributable evidence that Type II auditors look for. You can also add your own inherent and residual risk scores to create a complete dual-rating picture.
Upload your vendor contracts and Vendorapp Intelligence extracts key terms automatically — contract type, value, expiry date, renewal terms. Your DPAs and security agreements are stored alongside your vendor profiles, findable in seconds during an audit evidence request.
Smart alerts notify you of vendor security incidents, sanctions changes, and contract expiries automatically. Continuous screening against OFAC, UN, EU, UK OFSI, and DFAT watchlists runs in the background. Your ongoing monitoring is happening whether or not anyone remembers to do it — and there's an audit trail to prove it.
When your auditor asks for CC9.2 evidence, you export — not scramble. Vendorapp generates complete vendor risk reports with your register, classifications, assessment history, monitoring records, and contract status. Inactive vendors are preserved in your history, never deleted, so your offboarding record is automatic.
Working alongside your SOC 2 platform
If you're using Vanta, Drata, Sprinto, Secureframe, or a similar SOC 2 automation platform, you'll know that they surface CC9.2 as a control that requires active management — but they don't manage your vendor risk for you. They tell you the control needs to be satisfied; Vendorapp is how you satisfy it.
The typical workflow is: your SOC 2 platform flags vendor management as a required control, you manage your vendor risk in Vendorapp, and when your auditor needs evidence you export from Vendorapp and provide it as part of your SOC 2 evidence package. Many teams share their Vendorapp reports directly with their auditors or link them as evidence within their SOC 2 platform.
Common questions
CC9.2 requires you to assess vendors based on the risk they present — not necessarily every vendor with equal depth. A vendor with access to your production database warrants a more thorough assessment than a tool your marketing team uses for design work. What auditors are looking for is a risk-based approach: you know which vendors are critical, you've applied proportionate scrutiny to each, and you can demonstrate your rationale. Vendorapp's risk classification system helps you make and document exactly these distinctions.
SOC 2 doesn't mandate a specific review frequency, but most auditors expect at least annual formal reviews for all vendors in your register, with more frequent reviews for critical vendors. For Type II audits, you need evidence that reviews have actually happened during the audit period — not just a policy that says they should. Vendorapp's smart alerts and continuous monitoring mean your ongoing review is automated, and every check is timestamped as evidence.
For SOC 2, a vendor agreement that addresses security can take several forms: a formal contract with security provisions, a Data Processing Agreement (DPA), or a vendor's published terms of service if they explicitly address information security obligations. The key requirement is that the agreement sets out what the vendor can and cannot do with your data, how they're expected to protect it, and what happens in the event of a breach. Clicking through standard terms without reading them doesn't satisfy this — you should be able to articulate, for each critical vendor, what the security provisions in your agreement actually say.
A Type I audit assesses whether your vendor management controls are suitably designed as of a specific date. An auditor reviews your processes, your documentation, and your vendor register and makes a judgement about whether your approach is fit for purpose. A Type II audit covers a period — typically six to twelve months — and tests whether your controls have actually been operating effectively throughout that period. For vendor management, this means you need evidence that assessments happened, monitoring ran, and reviews were conducted — not just that you had a process that said they would.
SOC 2 automation platforms like Vanta and Drata are excellent for managing your overall compliance programme and connecting your controls to evidence. They surface CC9.2 as a control that needs to be satisfied, but they don't run vendor risk assessments, manage your contract register, or provide continuous sanctions screening. Vendorapp handles the vendor risk management piece specifically — the two tools are complementary. Vendorapp's exports slot directly into your SOC 2 evidence package as proof of CC9.2 compliance.
Most teams complete their initial vendor register and run their first round of assessments within a few hours of signing up. If you have an audit in the next few weeks and need to demonstrate CC9.2 compliance, a single afternoon with Vendorapp will get you further than most companies manage in months of manual effort. The free plan covers the core of what SOC 2 requires — you can get started today without a procurement process or contract.
Free to start, no consultant required. Set up your SOC 2-ready vendor programme in an afternoon and have evidence ready before your next auditor call.
Start free — no card neededWe use cookies to analyze usage and enhance site navigation to give you the best experience.