Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is a vendor management policy?

A vendor management policy is an important component of an organization’s larger compliance risk management strategy. It is a best practice for any organization that works with sensitive data and customers’ personally identifiable information (PII) to develop a policy to review all vendors — each third-party, contractor, or associate with whom an organization does business — and to establish requirements for the level of information security that vendors should maintain. As an organization outsources to a wider ecosystem of vendors and partners, its risk increases.

A vendor management policy, developed and overseen by a cross-company team, will help an organization evaluate its current vendors according to level of risk, and to assess potential new vendors for adherence to appropriate cybersecurity practices. A successful vendor management policy will also establish processes for the continuous monitoring of third-party and fourth-party service providers to ensure their ongoing adherence to an appropriate level of security.

Organizations maintaining a vendor management policy may have a particular interest in working with vendors who meet security requirements such as SOC 2 compliance.

Additional resources you might like:

Security
Guide
Growing pains: How to update and automate outdated security processes

Has your business outgrown its security processes? Learn how to update them in this guide.

Security
Event
Building security programs that reduce risk

In today’s evolving threat landscape, compliance is only the first step—resilience is the ultimate goal. That’s why Vanta and Huntress have teamed up to help you achieve true cybersecurity resilience.

Security
Blog
How to protect your physical infrastructure with AWS and Vanta

In this blog, we’ll cover physical and environmental infrastructure, explaining what AWS does to protect the cloud centers that store your data and what other security steps you need to take.

Additional resources you might like:

Security
Guide
Growing pains: How to update and automate outdated security processes

Has your business outgrown its security processes? Learn how to update them in this guide.

Security
Event
Building security programs that reduce risk

In today’s evolving threat landscape, compliance is only the first step—resilience is the ultimate goal. That’s why Vanta and Huntress have teamed up to help you achieve true cybersecurity resilience.

Security
Blog
How to protect your physical infrastructure with AWS and Vanta

In this blog, we’ll cover physical and environmental infrastructure, explaining what AWS does to protect the cloud centers that store your data and what other security steps you need to take.

Security
Blog
From automated compliance to AI: How investors are prioritizing security

AI and cybersecurity are top strategic priorities for companies at every scale. See how investors are thinking about security in our increasingly-AI driven world.

Security
Event
Enhancing Security with Trust Center

What is a Trust Center, and how can growing businesses leverage one to proactively demonstrate their commitment to security?

Security
Blog
What is continuous security monitoring?

What is continuous security monitoring and why is it crucial to your business? Learn about continuous monitoring and best practices for ensuring security within your organization.

Security
Blog
Lessons from Vanta’s WebAuthn migration

Rob Picard and Jess Chang from Vanta's Security team explain why and how we migrated to WebAuthn as the mandatory way to log into Okta.

Security
Event
Ask Me (Almost) Anything: AI & Compliance

Wondering about AI and what it means for your company’s compliance program? You can ask these privacy and security experts (almost) anything! Join Vanta’s AM(almost)A on June 27 at 10 am PT and 1 pm ET to connect with Matt Cooper, Senior Manager of Privacy, Risk, & Compliance, and Rob Picard, Security Lead, on emerging trends in AI and compliance. They’ll answer questions and share practical advice to help you navigate this evolving landscape and stay ahead of the curve.

Security
Guide
How to minimize third-party risk with vendor management

Get insights and best practices from security & compliance experts on how to manage third-party vendor risk in this free guide.

Get compliant and
build trust, fast.

Two wind turbines on a white background.
Get compliant and build trust,
fast.
Get started