Understanding SIG: the industry standard for vendor risk assessment
The 18 SIG risk domains explained
Common SIG failures and how to avoid them
Key Takeaways
TL;DR
SIG is the industry standard for third-party risk assessment, covering 18 risk domains across cybersecurity, privacy, and operational resilience.
SIG Lite (~200 questions) is for lower-risk assessments; SIG Full (~800+ questions) is for vendors with access to sensitive data or critical systems.
Cross-framework mapping means a single SIG completion can satisfy assessments based on NIST CSF, ISO 27001, SOC 2, and other frameworks.
Specific, evidence-backed responses are essential — generic answers are the top reason for SIG failures.
CDA scan data maps directly to multiple SIG domains, providing verifiable technical evidence for access control, network security, and compliance.
Official Sources
FAQ
Frequently asked questions
How do I know whether to prepare for SIG Lite or SIG Full?
Your client will specify which version they require, typically based on their vendor tiering process. Vendors classified as high-risk (access to sensitive data, system integrations, or critical dependencies) receive SIG Full. Lower-risk vendors receive SIG Lite. If you are unsure, ask your client contact or their third-party risk management team. Preparing for SIG Full ensures you are ready for either version, since SIG Lite is a subset of SIG Full domains.
How often do we need to complete SIG questionnaires?
Most organizations require annual SIG reassessment for active vendors. Some high-risk relationships require semi-annual updates or event-triggered reassessments after significant security incidents or organizational changes. The SIG questionnaire itself is updated annually by Shared Assessments, so expect some questions to change year over year. Maintaining a current response library significantly reduces the effort for annual renewals.
Can CDA scan data replace parts of the SIG assessment?
CDA scan data does not replace the SIG assessment, but it provides verifiable technical evidence that strengthens your responses across multiple domains including Network Security, Access Control, Cybersecurity Incident Management, and Compliance. Attaching your CDA report demonstrates that your security posture claims are backed by independent, continuous scanning rather than self-attestation alone. Many assessors view third-party scan evidence as more reliable than self-reported answers.
Get your Cyber Defense Score™ in 60 seconds.
100 tools. No installation. No credit card. Real evidence.