Due Diligence when selecting providers
1) Why Due Diligence Providers
Provider is a continuation of your chain of trust. Selection error = regulatory penalties, leaks, downtime, and reputational losses. Due Diligence (DD) allows:- Identify inherent risk by product/country/data.
- Verify compliance and safety prior to contract award.
- Record SLA/SLO and audit rights at contract stage.
- Configure monitoring and offboarding while maintaining data integrity.
2) When and what covers
Points: preliminary selection, short list, before the contract, with significant changes, annual review.
Coverage: legal status, financial stability, security, privacy, technical maturity, operation/support, compliance (GDPR/PCI/AML/SOC 2, etc.), geography and sanctions risks, ESG/ethics, subcontractors.
3) Roles and RACI
(R — Responsible; A — Accountable; C — Consulted; I — Informed)
4) Scorecard (what we check)
4. 1 Legal and Corporate Profile
Registration, beneficiaries (KYB), litigation, sanctions lists.
Licenses/certificates for regulated services.
4. 2 Finance and sustainability
Audited statements, debt load, key investors/banks.
Single client/region dependency, continuity plan (BCP).
4. 3 Security and privacy
ISMS (politicians, RACI), external test results, vulnerability management.
Encryption At Rest/In Transit, KMS/HSM, secret management.
DLP/EDRM, journaling, Legal Hold, retention and deletion.
Incident management: SLA notifications, playbooks, post-mortems.
4. 4 Compliance and certification
SOC 2/ISO 27001/PCI DSS/ISO 27701/CSA STAR (timing and scope).
GDPR/local norms: roles (controller/processor), DPA, SCC/BCR, DPIA.
AML/sanction loop (if applicable).
4. 5 Technical Maturity and Integration
Architecture (multi-tenancy, isolation, SLO, DR/HA, RTO/RPO).
API/SDK, versioning, rate limits, observability (logs/metrics/trails).
Change management, releases (blue-green/canary), backward compatibility.
4. 6 Operations and Support
24 × 7/Follow-the-sun, reaction/reduction time, oncalls.
Onboarding/offboarding procedures, data export without penalties.
4. 7 Sub-processors and supply chain
List of subcontractors, jurisdictions, their controls and change notices.
4. 8 Ethics/ESG
Anti-corruption policies, code of conduct, labor practices, reporting.
5) Due Diligence Process (SOP)
1. Initiation: demand card (goals, data, jurisdictions, criticality).
2. Qualification: short questionnaire (pre-screen) + sanction/license check.
3. Deep assessment: questionnaire, artifacts (policies, reports, certificates), interviews.
4. Technical check: security review, environment demo, reading logs/metrics, PoC.
5. Scoring and risks: inherent risk → control profile → residual risk.
6. Remediation: terms/corrections before the contract (gap list with deadlines).
7. Контракт: DPA/SLA/audit rights/liability/IP/termination/exit plan.
8. Onboarding: accesses/SSOs, data catalogs, integrations, monitoring plan.
9. Continuous monitoring: annual review/triggers (incident, sub-processor change).
10. Offboarding: export, deletion/anonymization, revocation of access, confirmation of destruction.
6) Provider questionnaire (core of questions)
Yur. person, beneficiaries, sanctions checks, disputes for 3 years.
Certifications (SOC 2 type/period, ISO, PCI), latest reports/scope.
Security policies, data inventory, classification, DLP/EDRM.
Technical isolation: tenant-isolation, network policies, encryption, keys.
Logs and audits: storage, access, WORM/immutability, SIEM/SOAR.
Incidents in 24 months: types, impact, lessons.
Retention/deletion/Legal Hold/DSAR stream.
Sub-processors: list, countries, functions, contractual guarantees.
DR/BCP: RTO/RPO, recent test results.
Support/SLA: reaction/decision times, escalations, credit schema.
Exit-plan: data export, formats, cost.
7) Scoring model (example)
Axes: Law/Finance/Security/Privacy/Engineering/Operations/Compliance/Chain/ESG.
Scores 1-5 on each axis; weight by service criticality and data type.
- 'RR = Σ (weight _ i × score _ i) '→ category: Low/Medium/High/Critical.
High/Critical: Pre-contract remediation, enhanced SLA conditions and monitoring are mandatory.
Low/Medium: standard requirements + annual revision.
8) Mandatory provisions of the contract (must-have)
DPA: roles (controller/processor), purpose, data categories, retention and deletion, Legal Hold, DSAR assistance.
SCC/BCR for cross-border transmissions (if applicable).
Security Appendix: encryption, logs, vulnerabilities/patching, penetration tests, vulnerabilities disclosure.
SLA/SLO: reaction/elimination time (sev-levels), credits/penalties, availability, RTO/RPO.
Audit Rights: right to audit/questionnaire/evidence; notifications of control/sub-processor changes.
Breach Notification: terms of notification (for example, ≤ 24-72 hours), format, cooperation in the investigation.
Subprocessor Clause: list, change by notice/agreement, responsibility.
Exit & Data Return/Deletion: export format, dates, confirmation of destruction, migration support.
Liability/Indemnity: limits/exceptions (PI leakage, license violation, regulatory fines).
IP/License - development/configuration/data/metadata rights.
9) Monitoring and review triggers
Expiration/renewal of certificates (SOC/ISO/PCI), changes in reporting status.
Change of sub-processors/storage locations/jurisdictions.
Security incidents/significant SLA outages.
Mergers/acquisitions, deterioration of financial performance.
Releases affecting isolation/encryption/access.
Regulatory inquiries, Findings audits.
10) Vendor Risk Mgmt Metrics and Dashboards
Coverage DD:% of critical providers that have passed full-fledged DD.
Time-to-Onboard: median from bid to contract (by risk category).
Open Gaps: active remediation by provider (timelines/owners).
SLA Breach Rate: Proportion of SLA breaches by time/availability.
Incident Rate: Incidents/12 months by provider and severity.
Audit Evidence Readiness: availability of up-to-date reports/certificates.
Subprocessor Drift - changes without notice (target 0).
11) Categorization and verification levels
12) Checklists
Starting DD
- Requirement card and service risk class.
- Pre-screen: sanctions, licenses, base profile.
- Questionnaire + artifacts (policies, reports, certificates).
- Security/Privacy review + PoC for integrations.
- Gap list with deadlines and owners.
- Contract: DPA/SLA/audit rights/liability/exit.
- Onboarding and monitoring plan (metrics, alerts).
Annual review
- Updated certificates and reports.
- Sub-processors/locations/jurisdictions check.
- Remediation status, new risks/incidents.
- DR/BCP tests and results.
- Dry-run audit: collect evidence "by button."
13) Red flags (red flags)
Refusal to provide SOC/ISO/PCI or material sections of reports.
Fuzzy answers for data encryption/logs/deletion.
There are no DR/BCP plans or they are not being tested.
Closed incidents without post-mortem and lessons.
Unlimited data transfer to sub-processors/abroad without guarantees.
Aggressive limitations of liability for PI leaks.
14) Antipatterns
"Paper" DD without PoC and technical verification.
Universal risk-free/jurisdictional checklist.
Contract without DPA/SLA/audit rights and exit plan.
Lack of a provider registry and change monitoring.
"Forever" issued accesses/tokens without rotation and re-attestation.
15) Related wiki articles
Compliance and reporting automation
Continuous Compliance Monitoring (CCM)
Legal Hold and Data Freeze
Policies and Procedures Lifecycle
KYC/KYB and sanction screening
Data Retention and Deletion Schedules
Continuity Plan (BCP) and DRP
Result
Risk-oriented Due Diligence is not a tick, but a managed process: correct categorization, deep verification along key axes, clear contractual guarantees and continuous monitoring. So suppliers become a reliable part of your chain, and you predictably meet the requirements without slowing down your business.