Which Software Should Be in Your SOC 2 and ISO 27001 Vendor Management Review?
B2B SaaS companies struggle to determine which vendors should be in their compliance vendor management program. Learn the decision framework to identify in-scope software for SOC 2 and ISO 27001.
TL;DR
| Criteria | Include in Vendor Management? | Examples |
|---|---|---|
| Stores/processes customer data | Always | AWS, Supabase, Datadog, Intercom |
| Impacts service availability | Always | Cloud providers, CDN, DNS, monitoring |
| Has access to source code/IP | Always | GitHub, CI/CD tools, code analysis |
| Authentication/identity | Always | Okta, Auth0, Google Workspace |
| Internal tools, no customer data | Usually not | HR/payroll, marketing automation |
| Marketing tools with PII | Depends | HubSpot (if syncing customer data) |
| Key Point | Summary |
|---|---|
| Focus on impact | Ask: "Could this vendor affect security, availability, or confidentiality of our service?" |
| Don't over-include | Too many vendors creates assessment fatigue and dilutes focus |
| Don't under-include | Missing critical vendors creates audit risk and actual security gaps |
| Review annually | Your vendor landscape changes; your scope should too |
A vendor belongs in your SOC 2/ISO 27001 program if it impacts the security, availability, processing integrity, or confidentiality of customer data or your service. Focus on vendors that store, process, or access customer data, that impact uptime, that transform data, or that handle proprietary code. Exclude internal tools that never touch customer data or affect service delivery.
What Does "In-Scope Vendor" Mean?
An in-scope vendor is any third-party service or software provider whose operations could materially affect your ability to meet your security commitments to customers. For SOC 2 and ISO 27001, this means vendors that:
- Handle customer data in any way (storage, processing, transmission, access)
- Impact service availability (infrastructure, hosting, critical dependencies)
- Access confidential information (source code, trade secrets, internal systems)
The key insight: vendor management is not about cataloging every tool your company uses. It is about identifying and managing third-party risk where that risk could affect your customers.
The Compliance Requirements
SOC 2 addresses vendor management through multiple controls within the Trust Services Criteria:
- CC9.2 (Risk Mitigation): The primary vendor management control. Requires assessing and monitoring third-party service providers whose services are part of your system or could affect the security, availability, processing integrity, or confidentiality of your systems
- CC2.3 (Communication with External Parties): Requires communicating relevant security matters to vendors and other external parties
- CC6.4 (Logical Access): Requires managing and restricting vendor access to your systems
These criteria require organizations to assess vendor security posture, document the assessment, and monitor for changes that could affect your service commitments.
ISO 27001 covers vendor management through Annex A controls, specifically A.5.19-A.5.23 (Supplier relationships) and supporting controls around information security in supplier agreements, managing information security within the ICT supply chain, and monitoring/reviewing supplier services.
Both frameworks expect you to:
- Maintain an inventory of in-scope vendors
- Assess vendor security posture before onboarding
- Review vendor security status periodically (typically annually)
- Document vendor contracts with appropriate security terms
Vendor management is a required policy for both frameworks. For the full list of policies you need, see our guides on SOC 2 policies and ISO 27001 documentation requirements.
The Decision Framework: Four Questions
For every vendor or software tool, ask these four questions. If the answer to any is "yes," the vendor is likely in scope.
1. Does this vendor impact the security of customer data?
This is the most important question. Consider whether the vendor:
- Stores customer data (databases, file storage, backups)
- Processes customer data (analytics, logging, monitoring)
- Transmits customer data (APIs, integrations, webhooks)
- Has access to systems containing customer data (support tools, admin panels)
Examples of YES:
- AWS/GCP/Azure (hosts your application and data)
- Supabase, MongoDB Atlas, PlanetScale (database providers)
- Datadog, Sentry, LogRocket (logging/monitoring that may contain PII)
- Intercom, Zendesk (customer support with access to customer information)
- Stripe, Plaid (payment and financial data)
Examples of NO:
- Figma (design tool, no customer data)
- Notion (internal wiki, assuming no customer data stored)
- Loom (internal video recordings)
2. Does this vendor impact the availability of your service?
If the vendor goes down, does your product stop working or degrade significantly? Consider:
- Infrastructure providers that host your application
- CDN and edge services that deliver your content
- DNS providers that route traffic to your service
- Critical SaaS dependencies your application calls in real-time
- Monitoring and alerting tools that detect outages
Examples of YES:
- Cloudflare, Fastly (CDN, DDoS protection)
- Route 53, Cloudflare DNS (DNS resolution)
- Twilio, SendGrid (if your app depends on messaging)
- Any API your application calls synchronously
Examples of NO:
- Google Analytics (tracking down doesn't break your app)
- Marketing email tools (delayed marketing emails don't affect product)
- Background analytics tools
3. Does this vendor impact processing integrity?
Processing integrity matters when vendors transform, calculate, or modify your data. If incorrect processing could affect customer outcomes, the vendor is in scope:
- ETL and data pipeline tools that transform customer data
- Calculation engines that process financial or business logic
- Integration platforms that sync data between systems
- AI/ML services that make decisions affecting customers
Examples of YES:
- Fivetran, Airbyte (data pipelines that transform data)
- Segment (customer data routing and transformation)
- AI services that process customer inputs (OpenAI, Anthropic APIs if used in production)
Examples of NO:
- Analytics tools that only read data without transformation
- Reporting tools that display data without modification
4. Does this vendor impact the confidentiality of your IP or proprietary information?
This covers vendors that could expose your competitive advantages or internal operations:
- Source code repositories where your code lives
- CI/CD pipelines that build and deploy your code
- Code analysis tools that scan your repositories
- Development environments with access to production secrets
Examples of YES:
- GitHub, GitLab, Bitbucket (source code)
- CircleCI, GitHub Actions, Jenkins (CI/CD)
- Snyk, SonarQube, Semgrep (code scanning)
- Vercel, Netlify, Heroku (deployment platforms)
- 1Password, HashiCorp Vault (secrets management)
Examples of NO:
- Project management tools (Jira, Linear) unless they contain sensitive architecture details
- Documentation tools (Confluence) unless storing sensitive technical specs
Note: These four questions map to SOC 2's Trust Services Criteria: Security, Availability, Processing Integrity, and Confidentiality. Privacy is the fifth criterion, but for vendor scoping purposes, it is typically covered under "security of customer data" since vendors handling personal data are already in scope.
Vendor Categories: Always In, Usually In, Depends, Usually Out
Always In Scope
These vendors should always be part of your vendor management program:
| Category | Examples | Why |
|---|---|---|
| Cloud Infrastructure | AWS, GCP, Azure, DigitalOcean | Hosts your application and customer data |
| Databases | Supabase, MongoDB Atlas, PlanetScale, RDS | Stores customer data directly |
| Authentication/Identity | Okta, Auth0, Google Workspace, Azure AD | Controls access to your systems and customer accounts |
| Source Control | GitHub, GitLab, Bitbucket | Contains your proprietary code |
| CI/CD | GitHub Actions, CircleCI, Jenkins, Buildkite | Accesses code, deploys to production |
| Secrets Management | 1Password Teams, HashiCorp Vault, AWS Secrets Manager | Stores credentials for all other systems |
| CDN/Edge | Cloudflare, Fastly, AWS CloudFront | Terminates TLS, may cache customer data |
| Payment Processing | Stripe, Braintree, Plaid | Handles financial data |
Usually In Scope
These vendors are typically in scope for B2B SaaS companies:
| Category | Examples | When In Scope |
|---|---|---|
| Monitoring/Logging | Datadog, Splunk, LogRocket | If logs contain customer data or PII |
| Error Tracking | Sentry, Bugsnag, Rollbar | If error payloads include customer context |
| Customer Support | Intercom, Zendesk, Freshdesk | Agents access customer data |
| CRM | HubSpot, Salesforce | If syncing customer data from your product |
| Communication (External) | Twilio, SendGrid, Mailgun | Handles customer communications |
| Analytics | Amplitude, Mixpanel, Heap | If tracking user behavior with identifiers |
| Data Pipeline/ETL | Fivetran, Airbyte, Segment | Transforms or routes customer data |
Depends on Your Configuration
These vendors may or may not be in scope depending on how you use them:
| Category | Examples | In Scope If... |
|---|---|---|
| Marketing Automation | HubSpot, Marketo, ActiveCampaign | Customer data synced from product |
| Project Management | Jira, Linear, Asana | Contains sensitive security/architecture details |
| Documentation | Notion, Confluence | Contains customer data or sensitive specs |
| Design Tools | Figma, Sketch | Contains mockups with real customer data |
| Video Recording | Loom, Zoom | Records calls with customers or sensitive content |
| Data Warehousing | Snowflake, BigQuery | Customer data replicated for analytics |
Usually Out of Scope
These vendors typically do not need to be in your compliance vendor management program:
| Category | Examples | Why Out of Scope |
|---|---|---|
| HR/Payroll | Rippling, Gusto, BambooHR | Employee data, not customer data* |
| Expense Management | Brex, Ramp, Expensify | Internal financial operations |
| Marketing (Non-PII) | Google Ads, LinkedIn Ads | Aggregated targeting, no PII |
| Internal Communication | Slack, Teams | Internal discussions only** |
| Learning/Training | Udemy, Coursera | Employee development |
*Exception: If your HR system integrates with identity management for access provisioning, consider including it in scope.
**Exception: If customer data is shared in Slack channels or with external parties, reconsider scope.
SOC 2 vs. ISO 27001: Vendor Management Differences
While both frameworks require vendor management, the emphasis differs:
SOC 2 Approach
SOC 2 focuses on vendors that affect your Trust Services Criteria commitments. The key control (CC9.2) requires you to:
- Identify third parties whose services are part of your system or could affect your commitments
- Assess those third parties' ability to meet your security requirements
- Obtain assurance about vendor controls (SOC 2 Type II reports are common but not the only acceptable method; security questionnaires, ISO 27001 certificates, or other evidence may suffice depending on vendor criticality)
- Address any Complementary User Entity Controls (CUECs) identified in vendor reports
- For vendors using the carve-out method in their SOC 2 report, separately assess any excluded subservice organizations
Evidence auditors expect:
- Vendor inventory tied to Trust Services Criteria impact
- SOC 2 Type II reports (or equivalent assurance) for critical vendors
- Documented evidence of review showing who reviewed each vendor report, when, and conclusions (e.g., "Reviewed AWS SOC 2 Type II on 2025-03-15 by Jane Smith. No exceptions impacting our environment. CUECs addressed in our IAM policy.")
- Bridge letters (also called gap letters) when a vendor's SOC 2 report period does not fully cover your audit period
- Contracts with security clauses including incident notification requirements, right-to-audit provisions, and data handling terms
ISO 27001 Approach
ISO 27001 takes a broader supplier relationship management view through Annex A controls:
- A.5.19: Information security in supplier relationships
- A.5.20: Addressing security within supplier agreements
- A.5.21: Managing information security in the ICT supply chain
- A.5.22: Monitoring, review, and change management of supplier services
- A.5.23: Information security for use of cloud services
Evidence auditors expect:
- Supplier register with risk classification
- Supplier security assessment process
- Contractual security requirements
- Regular supplier review cadence
- Supply chain risk considerations
Practical Differences
| Aspect | SOC 2 | ISO 27001 |
|---|---|---|
| Scope definition | Tied to system description and TSC | Tied to ISMS scope and risk assessment |
| Vendor assessment | Focus on SOC 2 reports | Broader assessment methods accepted |
| Supply chain | Less emphasis | Explicit ICT supply chain controls |
| Review frequency | Typically annual | Defined by your ISMS procedures |
| Documentation | Evidence-based testing | Process-based audit |
Pro tip: If you are pursuing both certifications, build your vendor management program to satisfy ISO 27001's broader requirements, then map to SOC 2 criteria. This ensures you meet both frameworks with one process. For a detailed comparison, see our guide on SOC 2 vs. ISO 27001.
Practical Checklist: Scoping Your Vendor Program
Use this checklist when evaluating whether a vendor belongs in scope:
Initial Screening Questions
- Does this vendor store, process, or transmit customer data?
- Does this vendor have access to systems containing customer data?
- Would an outage of this vendor affect our service availability?
- Does this vendor transform, calculate, or modify customer data?
- Does this vendor have access to our source code or proprietary IP?
- Does this vendor handle authentication or identity for our users or employees?
- Is this vendor part of our software supply chain (dependencies, build tools)?
If any answer is YES, the vendor is likely in scope.
Risk Classification
Once you determine a vendor is in scope, classify the risk level based on your risk assessment methodology:
| Risk Level | Criteria | Assessment Requirement |
|---|---|---|
| Critical | Direct customer data access, single point of failure | Annual SOC 2/ISO 27001 review, contract review |
| High | Indirect customer data access, significant availability impact | Annual security questionnaire or report review |
| Medium | Limited data access, some availability impact | Initial assessment, periodic re-evaluation |
| Low | Minimal data access, minimal availability impact | Initial assessment, exception-based review |
Assessment Methods by Vendor Type
| Vendor Type | Preferred Assessment | Fallback Assessment |
|---|---|---|
| Enterprise SaaS | Request SOC 2 Type II report | Security questionnaire (CAIQ, SIG) |
| Cloud Infrastructure | SOC 2 Type II + Shared Responsibility Model review | SOC 3 report, ISO 27001 certificate |
| Startups/Smaller Vendors | Security questionnaire | Reference checks, penetration test results |
| Open Source Dependencies | SBOM analysis, vulnerability scanning | Community security track record |
Common Mistakes to Avoid
1. Over-Including Vendors
The mistake: Adding every tool your company uses to the vendor management program.
Why it is wrong: Creates assessment fatigue, dilutes focus from truly critical vendors, and makes the program unsustainable. Your security team cannot meaningfully assess 150 vendors annually.
What to do instead: Apply the four-question framework rigorously. If a tool does not impact customer data security, availability, processing integrity, or confidentiality, it does not need formal vendor management.
2. Under-Including Vendors
The mistake: Only including your primary cloud provider and ignoring other critical dependencies.
Why it is wrong: Auditors will question why your GitHub, Datadog, or authentication provider is missing. Vendor management gaps are among the most common SOC 2 audit exceptions. More importantly, these vendors represent real risk.
What to do instead: Walk through your architecture diagram. Identify every external service your application depends on for security, availability, or functionality.
3. Forgetting Shadow IT
The mistake: Only tracking officially sanctioned tools while employees use unapproved services that handle customer data.
Why it is wrong: If a support engineer exports customer data to an unapproved spreadsheet tool, that tool is effectively in scope, and you have a control gap.
What to do instead:
- Implement a vendor approval process before new tools are adopted
- Use SSO enforcement to limit which apps can authenticate
- Periodically audit OAuth grants and installed apps
4. Ignoring Subservice Organizations
The mistake: Reviewing your primary vendor but not considering their downstream providers who also handle your data.
Why it is wrong: When your logging provider hosts on AWS, or your payment processor uses a third-party fraud detection service, your data flows to those parties too. SOC 2 calls these "subservice organizations"; GDPR uses "subprocessors"; ISO 27001 refers to them as "sub-suppliers."
Critical concept - Carve-out vs. Inclusive Method:
- Inclusive method: The vendor's SOC 2 report covers their subservice organization's controls. You get assurance about both in one report.
- Carve-out method: The subservice organization is excluded from the vendor's SOC 2 scope. You need to separately obtain and review that subservice organization's SOC 2 report.
Most SaaS vendors use the carve-out method for their cloud providers (AWS, GCP, Azure), meaning you should also review those cloud providers' SOC 2 reports.
What to do instead:
- Check the "Subservice Organizations" section in vendor SOC 2 reports to identify carve-outs
- For carved-out subservice organizations, obtain their SOC 2 reports separately
- Ensure your vendor contracts flow down security requirements
- Watch for concentration risk: if multiple critical vendors all use the same cloud provider, that is a single point of failure
- Focus due diligence on vendors with many subservice organizations or complex supply chains
5. One-Time Assessment Only
The mistake: Assessing vendors at onboarding and never reviewing them again.
Why it is wrong: Vendor security posture changes. That startup you onboarded two years ago may have grown, improved security, or degraded. Annual reviews catch changes.
What to do instead:
- Set annual review cadence for critical/high-risk vendors
- Request updated SOC 2 reports each year
- Monitor for vendor security incidents or breaches
6. Missing Software Supply Chain
The mistake: Focusing only on SaaS vendors while ignoring open-source dependencies and build tools.
Why it is wrong: Supply chain attacks like SolarWinds, Codecov, and npm package compromises show that your build pipeline and dependencies are attack vectors.
What to do instead:
- Maintain a Software Bill of Materials (SBOM)
- Use dependency scanning tools (Dependabot, Snyk, Renovate)
- Include CI/CD and deployment tools in vendor scope
Building Your Vendor Inventory
A compliant vendor inventory should include:
| Field | Purpose | Example |
|---|---|---|
| Vendor Name | Identification | AWS |
| Service Used | What you use it for | Cloud infrastructure (EC2, RDS, S3) |
| Data Classification | What data they access | Customer PII, application data |
| Risk Level | Critical/High/Medium/Low | Critical |
| Contract Date | When agreement signed | 2024-01-15 |
| Last Assessment | When security reviewed | 2025-06-01 |
| Assessment Type | How security was evaluated | SOC 2 Type II report review |
| Reviewer | Who conducted the review | Jane Smith |
| Review Notes | Summary of findings | No material exceptions; CUECs addressed |
| Next Review | When to reassess | 2026-06-01 |
| Owner | Who manages relationship | Infrastructure Team |
| CUECs/Notes | Relevant compliance notes | Must enable MFA, review IAM policies |
Pro tip: Start simple. A spreadsheet works fine initially. Move to GRC tooling only when you have more than 30-40 in-scope vendors or need workflow automation.
Frequently Asked Questions
Most B2B SaaS companies have 15-40 in-scope vendors. If you have fewer than 10, you may be under-including. If you have more than 60, you may be over-including or need to reconsider your risk classification approach.
Not all vendors have SOC 2 reports, especially smaller startups. Alternative approaches include: security questionnaires (CAIQ, SIG Lite), ISO 27001 certification, penetration test results, or direct security conversations. Document whatever evidence you collect.
Typically no, if Slack is only used for internal communication and no customer data is shared. However, if your support team discusses customer issues in Slack or shares screenshots with customer data, consider implementing data handling policies rather than formal vendor assessment.
Open source is part of your software supply chain. Maintain an SBOM, use automated vulnerability scanning, and monitor for security advisories. You do not need individual vendor assessments for each npm package, but you need a process to identify and remediate vulnerable dependencies.
A vendor is any third party you directly contract with. A subservice organization (SOC 2 terminology) or subprocessor (GDPR terminology) is a third party that your vendor uses to provide services to you. For example, if you use Datadog for monitoring and Datadog hosts on AWS, AWS is Datadog's subservice organization.
Under GDPR, vendors must disclose subprocessors. For SOC 2, check the "Subservice Organizations" section of vendor SOC 2 reports. Focus your assessment on direct vendors but ensure they flow down security requirements to their downstream providers.
Annual reviews are standard for critical and high-risk vendors. Medium-risk vendors can be reviewed every 18-24 months. Low-risk vendors can be exception-based (reviewed only when something changes or an incident occurs).
A bridge letter (or gap letter) is a document from a vendor confirming that no material changes occurred to their controls between the end of their SOC 2 report period and your audit date. For example, if your vendor's SOC 2 report covers January-December 2024 but your audit period ends in March 2025, you need a bridge letter covering January-March 2025. Request these from critical vendors when their report periods do not fully overlap with your audit period.
Conclusion
Effective vendor management for SOC 2 and ISO 27001 is not about tracking every tool your company uses. It is about identifying and managing third-party risk where that risk could impact your customers.
Apply the four-question framework: Does this vendor affect security, availability, processing integrity, or confidentiality? If yes, include it. If no, document why it is out of scope and move on.
Start with your critical vendors (cloud infrastructure, databases, authentication, source control), then expand to high-risk vendors (logging, monitoring, customer support). Avoid the trap of over-inclusion that creates unsustainable programs, but do not ignore the shadow IT and supply chain risks that auditors increasingly scrutinize.
Need help building a vendor management program that satisfies your compliance requirements without creating unnecessary overhead? Talk to our team about a practical approach to third-party risk management.
Sources
- AICPA Trust Services Criteria - SOC 2 control requirements including CC9.2 on third-party risk
- ISO/IEC 27001:2022 - Information security management system requirements
- ISO/IEC 27002:2022 - Information security controls including supplier relationship guidance
- NIST SP 800-53 Rev. 5 - Security and privacy controls including supply chain risk management (SR family)
- CSA CAIQ (Consensus Assessment Initiative Questionnaire) - Standardized cloud security questionnaire
- Shared Assessments SIG - Standardized Information Gathering questionnaire for vendor assessment
Share this article
Related Articles
SOC 2 vs. ISO 27001 vs. GDPR: Which Compliance Framework Does Your Business Need?
B2B SaaS startups often consider three major compliance frameworks: SOC 2, ISO 27001, and GDPR. Which one should your business prioritize? Let's break it down.
AI Agent Security Guardrails: What SOC 2 and ISO 27001 Certified SaaS Companies Need Now
Compliance frameworks are catching up to AI agents. If you're SOC 2 or ISO 27001 certified and shipping autonomous AI features, here's how to build guardrails that satisfy auditors while enabling innovation.
Everything SaaS Startups Need to Know About ISO 27001
Discover the ISO 27001 standard and its importance for your Startup. Learn its objectives, principles and the steps to certification in order to protect your sensitive data and that of your partners.
Learn More About Compliance
Explore our guides for deeper insights into compliance frameworks.
ISO 27001 vs Cyber Essentials: Which UK Certification Do You Need?
Both ISO 27001 and Cyber Essentials are recognized security certifications in the UK, but they serve different purposes. This guide helps you decide which certification (or both) fits your business needs.
ISO 27001 Compliance Checklist: Your Complete Implementation Guide
Implementing ISO 27001 can seem overwhelming with its comprehensive requirements. This checklist breaks down everything you need to do, organized by implementation phase.
Maintaining ISO 27001 Compliance: Year-Over-Year Guide
Getting ISO 27001 certified is just the beginning. Maintaining certification requires ongoing effort, but with the right approach, it becomes part of your normal operations. This guide covers how to sustain your ISMS effectively.
Other platforms check the box
We secure the box
Get in touch and learn why hundreds of companies trust Bastion to manage their security and fast-track their compliance.
Get Started