What Is a SIG Questionnaire? The Standardized Information Gathering Tool Explained

Your prospect just sent you an 800-question spreadsheet called a SIG and the deal is stalled until you return it. Here's exactly what the SIG questionnaire covers, how it maps to frameworks you already know, and how to stop spending 10 days on every one.

· Neil Cameron · Security Questionnaires · 14 min read
Your prospect just sent you an 800-question spreadsheet called a SIG and the deal is stalled until you return it. Here's exactly what the SIG questionnaire covers, how it maps to frameworks you already know, and how to stop spending 10 days on every one.

Key Takeaways

  • The SIG (Standardized Information Gathering) questionnaire is maintained by Shared Assessments and is one of the most widely used third-party risk assessment tools in enterprise procurement.
  • SIG comes in two versions: SIG Core with 800+ questions across 19 risk domains, and SIG Lite with roughly 200 questions for lower-risk assessments.
  • The SIG maps directly to major compliance frameworks including ISO 27001, NIST CSF, SOC 2, PCI DSS, HIPAA, and GDPR - which means a single well-prepared knowledge base can cover most of it.
  • Third-party cybersecurity risk is increasingly a deal-gating factor. Buyers are not moving contracts forward until your SIG is returned, reviewed, and approved. Completion speed directly affects deal velocity.
  • Most SaaS teams spend 5 - 10 business days completing a SIG Core manually. Teams with a centralised knowledge base of past responses can cut that to hours.

What Is a SIG Questionnaire?

A SIG questionnaire (Standardized Information Gathering questionnaire) is a structured risk assessment tool created and maintained by Shared Assessments, a member-driven organisation focused on third-party risk management. It provides a standardised way for enterprises to evaluate the security, privacy, and operational controls of their vendors before signing a contract. If a prospect has sent you a SIG as part of their security review, it means they are serious about the deal - but need assurance that your security posture meets their requirements before they can move forward.

For most B2B SaaS companies, receiving a SIG is both a buying signal and a time sink. The questionnaire is comprehensive by design. It covers everything from access control and encryption to business continuity and physical security. And because it is standardised, your buyer’s security team expects thorough, accurate, and referenced answers - not vague assurances. The commercial stakes are real: a delayed or poorly completed SIG can stall a deal for weeks, and an incomplete one can disqualify you entirely.

What Does the SIG Cover? The 19 Risk Domains

The SIG organises its questions across 19 risk domains, each targeting a specific area of your organisation’s security and operational posture. Understanding these domains is the first step to building repeatable, reusable answers rather than starting from scratch every time.

Here are the core domains covered in the SIG:

DomainWhat It Assesses
Enterprise Risk ManagementGovernance structure, risk appetite, board oversight
Security PolicyExistence and maintenance of information security policies
Organisational SecurityRoles, responsibilities, and security staffing
Asset and Information ManagementAsset inventory, classification, handling procedures
Human Resource SecurityBackground checks, security training, termination procedures
Physical and Environmental SecurityData centre controls, office security, environmental protections
IT Operations ManagementChange management, capacity planning, operational procedures
Access ControlAuthentication, authorisation, privilege management
Application SecuritySDLC security, code review, vulnerability management
Cybersecurity Incident ManagementIncident response plans, detection, escalation procedures
Operational ResilienceBusiness continuity, disaster recovery, backup procedures
Compliance and Operational RiskRegulatory compliance, audit practices, legal requirements
Endpoint Device SecurityMobile device management, endpoint protection
Network SecurityFirewalls, segmentation, intrusion detection
PrivacyData subject rights, consent management, data processing agreements
Threat ManagementThreat intelligence, vulnerability scanning, penetration testing
Server SecurityServer hardening, patching, configuration management
Cloud Hosting ServicesCloud provider assessments, shared responsibility model
Artificial IntelligenceAI governance, model risk, data handling in AI systems

The AI domain is a more recent addition, reflecting the growing scrutiny around how vendors use machine learning and large language models in their products. If your SaaS product uses AI in any capacity, expect detailed questions here.

Why the domain structure matters for your workflow

Each domain maps to specific areas of your security programme. This means you can assign domains to the people who actually own those areas: your infrastructure lead handles Network Security and Cloud Hosting, your people ops lead covers Human Resource Security, and your security lead covers Incident Management and Threat Management. Trying to have one person answer all 19 domains is how teams end up spending two weeks on a single questionnaire - and how CTOs end up answering questions about fire suppression systems at 11pm on a Thursday.

SIG Core vs. SIG Lite: Which One Will You Receive?

Shared Assessments publishes two versions of the SIG, and the version your prospect sends depends on how much risk your engagement represents to them.

SIG CoreSIG Lite
Number of questions800+~200
DepthDetailed, control-level questions with sub-questionsHigh-level, domain-level questions
Typical use caseVendors handling sensitive data, critical infrastructure, or high-value contractsLower-risk vendors, initial screening, or non-critical services
Time to complete (manual)5 - 10 business days1 - 3 business days
Time to complete (with knowledge base)HoursUnder an hour
Who sends itEnterprise security teams, regulated industries (financial services, healthcare)Mid-market companies, procurement teams doing initial triage

If you are selling into financial services, healthcare, or any enterprise with a mature third-party risk management (TPRM) programme, expect the SIG Core. These organisations are often required by regulators to conduct thorough vendor assessments, and the SIG Core gives them the granularity they need.

The SIG Lite is more common in initial vendor screening or when your product handles less sensitive data. Some organisations use it as a first pass: if your SIG Lite answers raise concerns, they escalate to a SIG Core.

The practical impact on your team

A SIG Core with 800+ questions is not something you knock out in an afternoon. Nothing says “welcome to enterprise sales” quite like opening an Excel file with 20 tabs and a README that is longer than your last board deck.

Without a system for managing your responses, each SIG becomes a mini-project: hunting through Google Drive for the right policy, pinging your engineering lead on Slack for a technical detail, copy-pasting answers from the last questionnaire you completed and hoping nothing has changed. It is the kind of work that eats into evenings and weekends, especially when three of them land at the same time - and they always land at the same time.

How the SIG Maps to Compliance Frameworks

One of the SIG’s most useful features is its cross-referencing to major compliance frameworks. Shared Assessments explicitly maps SIG questions to the controls in frameworks your buyers already care about.

Here is how the SIG aligns with the frameworks you are most likely already working with:

FrameworkSIG Mapping
ISO 27001SIG domains map to Annex A controls, particularly around access control, cryptography, operations security, and supplier relationships
SOC 2Trust Services Criteria (security, availability, processing integrity, confidentiality, privacy) align with multiple SIG domains
NIST CSFThe five NIST functions (Identify, Protect, Detect, Respond, Recover) are covered across SIG’s risk management, incident management, and resilience domains
PCI DSSNetwork security, access control, and encryption domains map directly to PCI DSS requirements
HIPAAPrivacy, access control, and incident management domains cover key HIPAA safeguards
GDPRThe Privacy domain addresses data subject rights, lawful basis for processing, and cross-border transfer requirements

What this means for your response strategy

If you have already documented your controls for SOC 2 or ISO 27001, you have already done a significant portion of the work required to answer a SIG. The problem is that most teams do not have those answers in a format that makes them easy to reuse. Your SOC 2 report lives in one place, your ISO 27001 Statement of Applicability in another, and your internal security policies in a wiki that may or may not be up to date.

The teams that complete SIGs quickly are the ones who have built a single source of truth: one centralised knowledge base where policies, control descriptions, and past questionnaire answers are all searchable and referenceable. When a SIG question asks about your encryption practices, you should be able to pull the answer from the same place whether it was originally written for SOC 2, ISO 27001, or a previous SIG.

A Repeatable SIG Response Process in 5 Steps

Completing a SIG does not have to be a scramble. Here is a repeatable process we use at ResponseHub - both internally when completing our own assessments and as the workflow we have built into the product for our customers.

Step 1: Scope and triage (30 minutes)

Before you answer a single question, scan the entire questionnaire and identify which domains are relevant to your product and engagement. Not every domain applies. If you do not operate physical data centres, the Physical and Environmental Security section may only need a brief “N/A - we use [cloud provider]” response with a link to their compliance page.

Step 2: Pull from your knowledge base (1 - 2 hours)

Match each question to existing answers from your centralised repository. If you have completed any previous SIG, SOC 2 questionnaire, or CAIQ (Consensus Assessments Initiative Questionnaire from the Cloud Security Alliance), many answers will carry over directly. This is where having a searchable, structured knowledge base saves you days.

Step 3: Fill gaps with policy owners (2 - 4 hours)

For questions where you do not have an existing answer, route them to the person who owns that domain. Your application security questions go to your engineering lead. Your HR security questions go to your people operations lead. Give them the specific question and the context of what the buyer is looking for - not a link to a 300-row spreadsheet with a message that says “can you check rows 47 through 112?”

Step 4: Review and cite sources (1 - 2 hours)

Every answer should reference the specific policy, control, or document that supports it. Enterprise security teams are not just reading your answers. They are checking whether those answers are backed by documented, implemented controls. An answer like “We encrypt data at rest using AES-256 as documented in our Data Protection Policy, Section 3.2” carries far more weight than “Yes, we encrypt data.”

Step 5: Submit and archive (30 minutes)

Submit the completed SIG and immediately archive it in your knowledge base. Every completed SIG makes the next one faster. The answers you write today become the foundation for every future assessment.

Using this process, a well-prepared team can complete a SIG Lite in under an hour and a SIG Core in a single working day - not the 5 - 10 days it takes when you are starting from scratch every time.

Why SIG Completion Speed Is a Revenue Problem

Security questionnaires sit directly in the critical path of your sales cycle. When a buyer sends you a SIG, the deal does not move forward until you return it completed and your answers pass their review. Every day you spend assembling responses is a day the contract is not signed.

I know this because I lived it. When I was CTO of a VC-backed SaaS startup, we hit a stretch where SIGs and security questionnaires were arriving faster than we could turn them around. We had live deals waiting on completed assessments, and I was the one pulling answers together between sprint planning, investor updates, and actually building the product. That experience - the late nights, the frantic Slack messages, the copy-paste archaeology through old Google Docs - is exactly why I built ResponseHub.

In competitive deals where your prospect is evaluating multiple vendors simultaneously, the team that returns a thorough, well-cited SIG first has a material advantage. Procurement teams have timelines. If your competitor returns their SIG in three days and yours takes three weeks, you have handed them a head start that no demo or pricing discount can claw back.

The maths is straightforward. If your average contract value is £50,000 and a delayed SIG pushes the close date back by three weeks, that is three weeks of revenue you are not recognising. Multiply that across 10 - 15 SIGs per quarter and the impact on your annual numbers is not trivial.

This is particularly painful for smaller SaaS teams. You do not have a dedicated GRC team or a compliance analyst whose only job is answering questionnaires. It is your CTO, your head of engineering, or your VP of Sales pulling answers together between their actual responsibilities. The opportunity cost is enormous. Every hour spent on a SIG is an hour not spent closing deals, shipping product, or building your team.

Stop Treating SIGs as Fire Drills

The SIG questionnaire is not going away. As TPRM programmes mature and regulatory requirements tighten, the volume and complexity of these assessments will only increase. If anything, the trend is accelerating - more buyers are formalising their vendor risk processes, and the bar for what counts as an acceptable response keeps rising.

The good news is that the SIG’s standardised structure is actually an advantage if you build the right system around it. Because the domains are consistent and the questions map to known frameworks, every SIG you complete well makes the next one faster. Your knowledge base compounds. Your response times shrink. Your team stops losing weekends to spreadsheets.

The teams that treat SIG responses as a one-off fire drill will keep spending 5 - 10 days per questionnaire, every time. The teams that build a centralised, searchable knowledge base and a repeatable process will complete them in hours. Over a year, that gap adds up to weeks of recovered time and deals that close faster.

Start by centralising your existing policies and past questionnaire responses into a single source of truth. Map your answers to the SIG’s 19 domains. Build the muscle now, because the next SIG is already on its way.

Frequently Asked Questions

What is the difference between SIG Core and SIG Lite?

SIG Core contains 800+ detailed questions across 19 risk domains and is used for high-risk vendor assessments, particularly in regulated industries like financial services and healthcare. SIG Lite contains approximately 200 higher-level questions and is used for initial vendor screening or lower-risk engagements. Many organisations use SIG Lite as a first pass and escalate to SIG Core if the vendor’s responses warrant deeper scrutiny.

Who creates and maintains the SIG questionnaire?

The SIG is created and maintained by Shared Assessments, a member-driven organisation focused on third-party risk management. They update the SIG annually to reflect evolving threats, regulatory changes, and industry standards. The most recent versions include questions about AI governance and cloud-native architectures.

How long does it take to complete a SIG questionnaire?

Manually completing a SIG Core typically takes 5 - 10 business days for a team without a centralised knowledge base. SIG Lite takes 1 - 3 business days. Teams that maintain a structured repository of past responses, policies, and control documentation can complete a SIG Core in a single working day and a SIG Lite in under an hour.

Can I reuse answers from SOC 2 or ISO 27001 for a SIG?

Yes. The SIG explicitly maps to major compliance frameworks including SOC 2, ISO 27001, NIST CSF, PCI DSS, HIPAA, and GDPR. If you have already documented your controls for any of these frameworks, much of that work directly applies to SIG responses. The key is having those answers centralised and searchable so you can match them to SIG questions efficiently.

Is the SIG questionnaire free?

Access to the SIG questionnaire requires a Shared Assessments membership. Membership fees vary based on organisation size and type. However, as a vendor, you will typically receive the SIG directly from your prospect or customer as part of their procurement process, so you do not necessarily need your own membership to complete one.

How often is the SIG updated?

Shared Assessments updates the SIG annually. Each new version reflects changes in the threat landscape, regulatory environment, and industry best practices. The addition of the AI governance domain in recent versions is one example. If you are reusing answers from a previous SIG, check that your responses still align with the current year’s version and that no new domains or questions have been added that apply to your product.

Stop Losing Weeks to SIG Questionnaires

ResponseHub is built from the ground up to solve the exact problem this article describes: getting SIGs and security questionnaires done in hours, not days, with answers grounded in your actual policies and cited to the exact page and section.

Upload your policies, import your past questionnaire responses, and let AI draft accurate, referenced answers that your team reviews and approves. No more hunting through Google Drive. No more copy-paste archaeology. No more late nights before a deadline.

Get started in under 5 minutes - completely self-serve, free trial, no sales call needed.

Back to Blog

Related Posts

View All Posts »