Which Software Should Be in Your SOC 2 and ISO 27001 Vendor Management Review?

B2B SaaS companies struggle to determine which vendors should be in their compliance vendor management program. Learn the decision framework to identify in-scope software for SOC 2 and ISO 27001.

18 min read·

TL;DR

Criteria Include in Vendor Management? Examples
Stores/processes customer data Always AWS, Supabase, Datadog, Intercom
Impacts service availability Always Cloud providers, CDN, DNS, monitoring
Has access to source code/IP Always GitHub, CI/CD tools, code analysis
Authentication/identity Always Okta, Auth0, Google Workspace
Internal tools, no customer data Usually not HR/payroll, marketing automation
Marketing tools with PII Depends HubSpot (if syncing customer data)
Key Point Summary
Focus on impact Ask: "Could this vendor affect security, availability, or confidentiality of our service?"
Don't over-include Too many vendors creates assessment fatigue and dilutes focus
Don't under-include Missing critical vendors creates audit risk and actual security gaps
Review annually Your vendor landscape changes; your scope should too

A vendor belongs in your SOC 2/ISO 27001 program if it impacts the security, availability, processing integrity, or confidentiality of customer data or your service. Focus on vendors that store, process, or access customer data, that impact uptime, that transform data, or that handle proprietary code. Exclude internal tools that never touch customer data or affect service delivery.


What Does "In-Scope Vendor" Mean?

An in-scope vendor is any third-party service or software provider whose operations could materially affect your ability to meet your security commitments to customers. For SOC 2 and ISO 27001, this means vendors that:

  1. Handle customer data in any way (storage, processing, transmission, access)
  2. Impact service availability (infrastructure, hosting, critical dependencies)
  3. Access confidential information (source code, trade secrets, internal systems)

The key insight: vendor management is not about cataloging every tool your company uses. It is about identifying and managing third-party risk where that risk could affect your customers.

The Compliance Requirements

SOC 2 addresses vendor management through multiple controls within the Trust Services Criteria:

  • CC9.2 (Risk Mitigation): The primary vendor management control. Requires assessing and monitoring third-party service providers whose services are part of your system or could affect the security, availability, processing integrity, or confidentiality of your systems
  • CC2.3 (Communication with External Parties): Requires communicating relevant security matters to vendors and other external parties
  • CC6.4 (Logical Access): Requires managing and restricting vendor access to your systems

These criteria require organizations to assess vendor security posture, document the assessment, and monitor for changes that could affect your service commitments.

ISO 27001 covers vendor management through Annex A controls, specifically A.5.19-A.5.23 (Supplier relationships) and supporting controls around information security in supplier agreements, managing information security within the ICT supply chain, and monitoring/reviewing supplier services.

Both frameworks expect you to:

  • Maintain an inventory of in-scope vendors
  • Assess vendor security posture before onboarding
  • Review vendor security status periodically (typically annually)
  • Document vendor contracts with appropriate security terms

Vendor management is a required policy for both frameworks. For the full list of policies you need, see our guides on SOC 2 policies and ISO 27001 documentation requirements.


The Decision Framework: Four Questions

For every vendor or software tool, ask these four questions. If the answer to any is "yes," the vendor is likely in scope.

1. Does this vendor impact the security of customer data?

This is the most important question. Consider whether the vendor:

  • Stores customer data (databases, file storage, backups)
  • Processes customer data (analytics, logging, monitoring)
  • Transmits customer data (APIs, integrations, webhooks)
  • Has access to systems containing customer data (support tools, admin panels)

Examples of YES:

  • AWS/GCP/Azure (hosts your application and data)
  • Supabase, MongoDB Atlas, PlanetScale (database providers)
  • Datadog, Sentry, LogRocket (logging/monitoring that may contain PII)
  • Intercom, Zendesk (customer support with access to customer information)
  • Stripe, Plaid (payment and financial data)

Examples of NO:

  • Figma (design tool, no customer data)
  • Notion (internal wiki, assuming no customer data stored)
  • Loom (internal video recordings)

2. Does this vendor impact the availability of your service?

If the vendor goes down, does your product stop working or degrade significantly? Consider:

  • Infrastructure providers that host your application
  • CDN and edge services that deliver your content
  • DNS providers that route traffic to your service
  • Critical SaaS dependencies your application calls in real-time
  • Monitoring and alerting tools that detect outages

Examples of YES:

  • Cloudflare, Fastly (CDN, DDoS protection)
  • Route 53, Cloudflare DNS (DNS resolution)
  • Twilio, SendGrid (if your app depends on messaging)
  • Any API your application calls synchronously

Examples of NO:

  • Google Analytics (tracking down doesn't break your app)
  • Marketing email tools (delayed marketing emails don't affect product)
  • Background analytics tools

3. Does this vendor impact processing integrity?

Processing integrity matters when vendors transform, calculate, or modify your data. If incorrect processing could affect customer outcomes, the vendor is in scope:

  • ETL and data pipeline tools that transform customer data
  • Calculation engines that process financial or business logic
  • Integration platforms that sync data between systems
  • AI/ML services that make decisions affecting customers

Examples of YES:

  • Fivetran, Airbyte (data pipelines that transform data)
  • Segment (customer data routing and transformation)
  • AI services that process customer inputs (OpenAI, Anthropic APIs if used in production)

Examples of NO:

  • Analytics tools that only read data without transformation
  • Reporting tools that display data without modification

4. Does this vendor impact the confidentiality of your IP or proprietary information?

This covers vendors that could expose your competitive advantages or internal operations:

  • Source code repositories where your code lives
  • CI/CD pipelines that build and deploy your code
  • Code analysis tools that scan your repositories
  • Development environments with access to production secrets

Examples of YES:

  • GitHub, GitLab, Bitbucket (source code)
  • CircleCI, GitHub Actions, Jenkins (CI/CD)
  • Snyk, SonarQube, Semgrep (code scanning)
  • Vercel, Netlify, Heroku (deployment platforms)
  • 1Password, HashiCorp Vault (secrets management)

Examples of NO:

  • Project management tools (Jira, Linear) unless they contain sensitive architecture details
  • Documentation tools (Confluence) unless storing sensitive technical specs

Note: These four questions map to SOC 2's Trust Services Criteria: Security, Availability, Processing Integrity, and Confidentiality. Privacy is the fifth criterion, but for vendor scoping purposes, it is typically covered under "security of customer data" since vendors handling personal data are already in scope.


Vendor Categories: Always In, Usually In, Depends, Usually Out

Always In Scope

These vendors should always be part of your vendor management program:

Category Examples Why
Cloud Infrastructure AWS, GCP, Azure, DigitalOcean Hosts your application and customer data
Databases Supabase, MongoDB Atlas, PlanetScale, RDS Stores customer data directly
Authentication/Identity Okta, Auth0, Google Workspace, Azure AD Controls access to your systems and customer accounts
Source Control GitHub, GitLab, Bitbucket Contains your proprietary code
CI/CD GitHub Actions, CircleCI, Jenkins, Buildkite Accesses code, deploys to production
Secrets Management 1Password Teams, HashiCorp Vault, AWS Secrets Manager Stores credentials for all other systems
CDN/Edge Cloudflare, Fastly, AWS CloudFront Terminates TLS, may cache customer data
Payment Processing Stripe, Braintree, Plaid Handles financial data

Usually In Scope

These vendors are typically in scope for B2B SaaS companies:

Category Examples When In Scope
Monitoring/Logging Datadog, Splunk, LogRocket If logs contain customer data or PII
Error Tracking Sentry, Bugsnag, Rollbar If error payloads include customer context
Customer Support Intercom, Zendesk, Freshdesk Agents access customer data
CRM HubSpot, Salesforce If syncing customer data from your product
Communication (External) Twilio, SendGrid, Mailgun Handles customer communications
Analytics Amplitude, Mixpanel, Heap If tracking user behavior with identifiers
Data Pipeline/ETL Fivetran, Airbyte, Segment Transforms or routes customer data

Depends on Your Configuration

These vendors may or may not be in scope depending on how you use them:

Category Examples In Scope If...
Marketing Automation HubSpot, Marketo, ActiveCampaign Customer data synced from product
Project Management Jira, Linear, Asana Contains sensitive security/architecture details
Documentation Notion, Confluence Contains customer data or sensitive specs
Design Tools Figma, Sketch Contains mockups with real customer data
Video Recording Loom, Zoom Records calls with customers or sensitive content
Data Warehousing Snowflake, BigQuery Customer data replicated for analytics

Usually Out of Scope

These vendors typically do not need to be in your compliance vendor management program:

Category Examples Why Out of Scope
HR/Payroll Rippling, Gusto, BambooHR Employee data, not customer data*
Expense Management Brex, Ramp, Expensify Internal financial operations
Marketing (Non-PII) Google Ads, LinkedIn Ads Aggregated targeting, no PII
Internal Communication Slack, Teams Internal discussions only**
Learning/Training Udemy, Coursera Employee development

*Exception: If your HR system integrates with identity management for access provisioning, consider including it in scope.

**Exception: If customer data is shared in Slack channels or with external parties, reconsider scope.


SOC 2 vs. ISO 27001: Vendor Management Differences

While both frameworks require vendor management, the emphasis differs:

SOC 2 Approach

SOC 2 focuses on vendors that affect your Trust Services Criteria commitments. The key control (CC9.2) requires you to:

  • Identify third parties whose services are part of your system or could affect your commitments
  • Assess those third parties' ability to meet your security requirements
  • Obtain assurance about vendor controls (SOC 2 Type II reports are common but not the only acceptable method; security questionnaires, ISO 27001 certificates, or other evidence may suffice depending on vendor criticality)
  • Address any Complementary User Entity Controls (CUECs) identified in vendor reports
  • For vendors using the carve-out method in their SOC 2 report, separately assess any excluded subservice organizations

Evidence auditors expect:

  • Vendor inventory tied to Trust Services Criteria impact
  • SOC 2 Type II reports (or equivalent assurance) for critical vendors
  • Documented evidence of review showing who reviewed each vendor report, when, and conclusions (e.g., "Reviewed AWS SOC 2 Type II on 2025-03-15 by Jane Smith. No exceptions impacting our environment. CUECs addressed in our IAM policy.")
  • Bridge letters (also called gap letters) when a vendor's SOC 2 report period does not fully cover your audit period
  • Contracts with security clauses including incident notification requirements, right-to-audit provisions, and data handling terms

ISO 27001 Approach

ISO 27001 takes a broader supplier relationship management view through Annex A controls:

  • A.5.19: Information security in supplier relationships
  • A.5.20: Addressing security within supplier agreements
  • A.5.21: Managing information security in the ICT supply chain
  • A.5.22: Monitoring, review, and change management of supplier services
  • A.5.23: Information security for use of cloud services

Evidence auditors expect:

  • Supplier register with risk classification
  • Supplier security assessment process
  • Contractual security requirements
  • Regular supplier review cadence
  • Supply chain risk considerations

Practical Differences

Aspect SOC 2 ISO 27001
Scope definition Tied to system description and TSC Tied to ISMS scope and risk assessment
Vendor assessment Focus on SOC 2 reports Broader assessment methods accepted
Supply chain Less emphasis Explicit ICT supply chain controls
Review frequency Typically annual Defined by your ISMS procedures
Documentation Evidence-based testing Process-based audit

Pro tip: If you are pursuing both certifications, build your vendor management program to satisfy ISO 27001's broader requirements, then map to SOC 2 criteria. This ensures you meet both frameworks with one process. For a detailed comparison, see our guide on SOC 2 vs. ISO 27001.


Practical Checklist: Scoping Your Vendor Program

Use this checklist when evaluating whether a vendor belongs in scope:

Initial Screening Questions

  • Does this vendor store, process, or transmit customer data?
  • Does this vendor have access to systems containing customer data?
  • Would an outage of this vendor affect our service availability?
  • Does this vendor transform, calculate, or modify customer data?
  • Does this vendor have access to our source code or proprietary IP?
  • Does this vendor handle authentication or identity for our users or employees?
  • Is this vendor part of our software supply chain (dependencies, build tools)?

If any answer is YES, the vendor is likely in scope.

Risk Classification

Once you determine a vendor is in scope, classify the risk level based on your risk assessment methodology:

Risk Level Criteria Assessment Requirement
Critical Direct customer data access, single point of failure Annual SOC 2/ISO 27001 review, contract review
High Indirect customer data access, significant availability impact Annual security questionnaire or report review
Medium Limited data access, some availability impact Initial assessment, periodic re-evaluation
Low Minimal data access, minimal availability impact Initial assessment, exception-based review

Assessment Methods by Vendor Type

Vendor Type Preferred Assessment Fallback Assessment
Enterprise SaaS Request SOC 2 Type II report Security questionnaire (CAIQ, SIG)
Cloud Infrastructure SOC 2 Type II + Shared Responsibility Model review SOC 3 report, ISO 27001 certificate
Startups/Smaller Vendors Security questionnaire Reference checks, penetration test results
Open Source Dependencies SBOM analysis, vulnerability scanning Community security track record

Common Mistakes to Avoid

1. Over-Including Vendors

The mistake: Adding every tool your company uses to the vendor management program.

Why it is wrong: Creates assessment fatigue, dilutes focus from truly critical vendors, and makes the program unsustainable. Your security team cannot meaningfully assess 150 vendors annually.

What to do instead: Apply the four-question framework rigorously. If a tool does not impact customer data security, availability, processing integrity, or confidentiality, it does not need formal vendor management.

2. Under-Including Vendors

The mistake: Only including your primary cloud provider and ignoring other critical dependencies.

Why it is wrong: Auditors will question why your GitHub, Datadog, or authentication provider is missing. Vendor management gaps are among the most common SOC 2 audit exceptions. More importantly, these vendors represent real risk.

What to do instead: Walk through your architecture diagram. Identify every external service your application depends on for security, availability, or functionality.

3. Forgetting Shadow IT

The mistake: Only tracking officially sanctioned tools while employees use unapproved services that handle customer data.

Why it is wrong: If a support engineer exports customer data to an unapproved spreadsheet tool, that tool is effectively in scope, and you have a control gap.

What to do instead:

  • Implement a vendor approval process before new tools are adopted
  • Use SSO enforcement to limit which apps can authenticate
  • Periodically audit OAuth grants and installed apps

4. Ignoring Subservice Organizations

The mistake: Reviewing your primary vendor but not considering their downstream providers who also handle your data.

Why it is wrong: When your logging provider hosts on AWS, or your payment processor uses a third-party fraud detection service, your data flows to those parties too. SOC 2 calls these "subservice organizations"; GDPR uses "subprocessors"; ISO 27001 refers to them as "sub-suppliers."

Critical concept - Carve-out vs. Inclusive Method:

  • Inclusive method: The vendor's SOC 2 report covers their subservice organization's controls. You get assurance about both in one report.
  • Carve-out method: The subservice organization is excluded from the vendor's SOC 2 scope. You need to separately obtain and review that subservice organization's SOC 2 report.

Most SaaS vendors use the carve-out method for their cloud providers (AWS, GCP, Azure), meaning you should also review those cloud providers' SOC 2 reports.

What to do instead:

  • Check the "Subservice Organizations" section in vendor SOC 2 reports to identify carve-outs
  • For carved-out subservice organizations, obtain their SOC 2 reports separately
  • Ensure your vendor contracts flow down security requirements
  • Watch for concentration risk: if multiple critical vendors all use the same cloud provider, that is a single point of failure
  • Focus due diligence on vendors with many subservice organizations or complex supply chains

5. One-Time Assessment Only

The mistake: Assessing vendors at onboarding and never reviewing them again.

Why it is wrong: Vendor security posture changes. That startup you onboarded two years ago may have grown, improved security, or degraded. Annual reviews catch changes.

What to do instead:

  • Set annual review cadence for critical/high-risk vendors
  • Request updated SOC 2 reports each year
  • Monitor for vendor security incidents or breaches

6. Missing Software Supply Chain

The mistake: Focusing only on SaaS vendors while ignoring open-source dependencies and build tools.

Why it is wrong: Supply chain attacks like SolarWinds, Codecov, and npm package compromises show that your build pipeline and dependencies are attack vectors.

What to do instead:

  • Maintain a Software Bill of Materials (SBOM)
  • Use dependency scanning tools (Dependabot, Snyk, Renovate)
  • Include CI/CD and deployment tools in vendor scope

Building Your Vendor Inventory

A compliant vendor inventory should include:

Field Purpose Example
Vendor Name Identification AWS
Service Used What you use it for Cloud infrastructure (EC2, RDS, S3)
Data Classification What data they access Customer PII, application data
Risk Level Critical/High/Medium/Low Critical
Contract Date When agreement signed 2024-01-15
Last Assessment When security reviewed 2025-06-01
Assessment Type How security was evaluated SOC 2 Type II report review
Reviewer Who conducted the review Jane Smith
Review Notes Summary of findings No material exceptions; CUECs addressed
Next Review When to reassess 2026-06-01
Owner Who manages relationship Infrastructure Team
CUECs/Notes Relevant compliance notes Must enable MFA, review IAM policies

Pro tip: Start simple. A spreadsheet works fine initially. Move to GRC tooling only when you have more than 30-40 in-scope vendors or need workflow automation.


Frequently Asked Questions

Most B2B SaaS companies have 15-40 in-scope vendors. If you have fewer than 10, you may be under-including. If you have more than 60, you may be over-including or need to reconsider your risk classification approach.

Not all vendors have SOC 2 reports, especially smaller startups. Alternative approaches include: security questionnaires (CAIQ, SIG Lite), ISO 27001 certification, penetration test results, or direct security conversations. Document whatever evidence you collect.

Typically no, if Slack is only used for internal communication and no customer data is shared. However, if your support team discusses customer issues in Slack or shares screenshots with customer data, consider implementing data handling policies rather than formal vendor assessment.

Open source is part of your software supply chain. Maintain an SBOM, use automated vulnerability scanning, and monitor for security advisories. You do not need individual vendor assessments for each npm package, but you need a process to identify and remediate vulnerable dependencies.

A vendor is any third party you directly contract with. A subservice organization (SOC 2 terminology) or subprocessor (GDPR terminology) is a third party that your vendor uses to provide services to you. For example, if you use Datadog for monitoring and Datadog hosts on AWS, AWS is Datadog's subservice organization.

Under GDPR, vendors must disclose subprocessors. For SOC 2, check the "Subservice Organizations" section of vendor SOC 2 reports. Focus your assessment on direct vendors but ensure they flow down security requirements to their downstream providers.

Annual reviews are standard for critical and high-risk vendors. Medium-risk vendors can be reviewed every 18-24 months. Low-risk vendors can be exception-based (reviewed only when something changes or an incident occurs).

A bridge letter (or gap letter) is a document from a vendor confirming that no material changes occurred to their controls between the end of their SOC 2 report period and your audit date. For example, if your vendor's SOC 2 report covers January-December 2024 but your audit period ends in March 2025, you need a bridge letter covering January-March 2025. Request these from critical vendors when their report periods do not fully overlap with your audit period.


Conclusion

Effective vendor management for SOC 2 and ISO 27001 is not about tracking every tool your company uses. It is about identifying and managing third-party risk where that risk could impact your customers.

Apply the four-question framework: Does this vendor affect security, availability, processing integrity, or confidentiality? If yes, include it. If no, document why it is out of scope and move on.

Start with your critical vendors (cloud infrastructure, databases, authentication, source control), then expand to high-risk vendors (logging, monitoring, customer support). Avoid the trap of over-inclusion that creates unsustainable programs, but do not ignore the shadow IT and supply chain risks that auditors increasingly scrutinize.

Need help building a vendor management program that satisfies your compliance requirements without creating unnecessary overhead? Talk to our team about a practical approach to third-party risk management.


Sources

Share this article

Other platforms check the box

We secure the box

Get in touch and learn why hundreds of companies trust Bastion to manage their security and fast-track their compliance.

Get Started