The Essential Security Questions
The Third Parties You Rely On to Deliver the Service
Supply chain security, vendor management, and third-party integrations.
Questions in this Category
Do you use sub-processors to process customer data? Please provide a list.
Explanation of the Question This question is asking whether your organization engages third-party vendors or service providers (sub-processors) to handle customer data on your behalf.
How do you assess the security posture of your third-party vendors and sub-processors?
Explanation of the Question This question is asking how your organization evaluates the security practices and measures of external entities that you work with, such as third-party vendors and sub...
Do all sub-processors maintain equivalent security and privacy controls to your own?
Explanation of the Question: This question is asking whether the third-party service providers (sub-processors) that your organization uses also have the same level of security and privacy measure...
Will you notify customers before engaging new sub-processors who will handle their data?
Explanation of the Question: This question is asking whether your organization informs its customers before you start working with new third-party service providers (sub-processors) that will hand...
ResponseHub is the product I wish I had when I was a CTO
Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.
As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!
I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

