Question 1 of 8
Inventory & Scope
Define the scope of your vendor landscape and risk surface.
How many active vendors does your organization currently manage?
Answer every question to unlock your personalized maturity score and ALE exposure calculation.
Need Professional IT Services?
Our IT professionals can help optimize your infrastructure and improve your operations.
References & Citations
- National Institute of Standards and Technology. (2024). Third-Party Risk Management: A Primer. Retrieved from https://csrc.nist.gov/publications/detail/sp/800-161/rev-1/final (accessed January 2025)
- Shared Assessments. (2024). Shared Assessments SIG Questionnaire. Retrieved from https://sharedassessments.org/sig/ (accessed January 2025)
Note: These citations are provided for informational and educational purposes. Always verify information with the original sources and consult with qualified professionals for specific advice related to your situation.
Key Security Terms
Understand the essential concepts behind this tool
Attack Surface
The total number of points where an unauthorized user could try to enter data into, or extract data from, an environment.
Cloud Security Posture Management (CSPM)
Continuous monitoring and remediation of cloud misconfigurations across accounts, services, and regions.
Vulnerability Management
The continuous process of identifying, prioritizing, and remediating security weaknesses in systems and applications.
Common Vulnerabilities and Exposures (CVE)
A standardized identifier for publicly disclosed security vulnerabilities in software and hardware.
Frequently Asked Questions
Common questions about the VRM Breach-Proof Scorecard