Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is a security questionnaire?

A security questionnaire is a tool that an enterprise may circulate to service organizations to evaluate and validate an organization’s security practices before choosing to do business with that organization. Each enterprise seeking information about a company’s security practices may develop its own security questionnaire.

Obtaining a SOC 2 audit and report can offer a service organization the opportunity to get out ahead of lengthy customized security questionnaires answered on a customer-by-customer basis, by producing a single standardized assessment and documentation of the organization’s verified security practices.

Additional resources you might like:

Compliance
Blog
Compliance risk: A guide to assess and manage it effectively

Learn what compliance risk is and what its most common types are. Find out how to assess and manage your compliance risk and best practices to follow.

Comparisons and reviews
Blog
The best TPRM software for 2026

Discover the best third-party risk management software solutions for 2026.

Comparisons and reviews
Blog
Top 5 OneTrust alternatives

Check out top OneTrust alternatives for compliance and risk management.

Additional resources you might like:

Compliance
Blog
Compliance risk: A guide to assess and manage it effectively

Learn what compliance risk is and what its most common types are. Find out how to assess and manage your compliance risk and best practices to follow.

Comparisons and reviews
Blog
The best TPRM software for 2026

Discover the best third-party risk management software solutions for 2026.

Comparisons and reviews
Blog
Top 5 OneTrust alternatives

Check out top OneTrust alternatives for compliance and risk management.

Comparisons and reviews
Blog
Top 4 Secureframe alternatives

Explore features, limitations, and scalable compliance solutions.

Vendor Risk Management
Blog
GDPR, NIS 2, and DORA converge on one problem: Third-party risk

Discover how EU regulations, GDPR, NIS 2, and DORA, make third-party risk a direct, continuous business liability. Find out why most teams still lack visibility.

Compliance
Events
Auditor basics: A 30 minute guide for startups

In this exclusive live event, we'll cover what audits are, and why continuous compliance separates smooth audits from painful ones.

Compliance
Blog
How to become PCI compliant in three steps

Being PCI compliant can mean different requirements for merchants and service providers. Learn how to become PCI compliant in three easy steps.

Product updates
Events
Vanta Delivers: Live from New York

Join us to see new product capabilities and live demos, and learn how Vanta is delivering a unified risk experience for GRC teams.

Vendor Risk Management
Events
AI broke your Third Party Risk Management program. Now what?

Watch on demand to learn where traditional TPRM breaks down in an AI-first world, and how one team rebuilt their program to actually keep up.