Skip to main content
Compliance Workflows

SOC 2 CC9.2 Vendor Management: What Your Auditor Actually Needs to See

March 25, 2026

SOC 2 CC9.2 requires organizations to assess and manage risks associated with third-party service providers. But most compliance teams misunderstand what auditors actually check — it's not whether you have a vendor list, it's whether you can demonstrate a documented, repeatable process for evaluating vendor risk with independently gathered evidence. This guide breaks down exactly what CC9.2 requires, what gets flagged, and how to build a vendor evidence file that satisfies Big 4 and regional auditors.

What CC9.2 specifically requires

CC9.2 (Risk Assessment of Third Parties) states that the entity assesses the risks associated with vendors and business partners. The AICPA Trust Services Criteria further specify that this includes: identifying third parties with access to systems or data, assessing risks of third-party relationships, evaluating the design and operating effectiveness of third-party controls, and monitoring third-party risk over time. In practice, this means your auditor expects to see four things: a complete vendor inventory, a risk assessment for each vendor proportional to their access and criticality, evidence of due diligence with cited sources, and periodic reassessment documentation.

The three things auditors check

Inventory completeness. Your auditor will compare your vendor list against your accounts payable records, SSO integrations, and infrastructure configuration. Missing vendors are a finding. The inventory should include vendor name, service provided, data access level, risk tier, assessment date, and next review date.

Assessment quality. For each vendor, auditors look for documented findings from identified sources — not just a risk rating in a spreadsheet. They want to see what you checked (sanctions, certifications, cyber posture, adverse media), what you found, and how that informed your risk decision. Self-reported vendor questionnaires without independent verification are increasingly questioned.

Reassessment cadence. CC9.2 implies ongoing monitoring. Auditors check whether you reassess vendors periodically (typically annually for critical vendors) and whether you re-evaluate after material events like breaches, acquisitions, or regulatory actions. A vendor assessed in 2023 with no update in 2025 will be flagged.

Common CC9.2 failures

Incomplete vendor inventory. The most common finding — teams forget shadow IT, embedded SDKs, or vendors accessed through other vendors (fourth parties). Build your inventory from multiple sources: procurement records, SSO logs, browser extension audits, and cloud marketplace purchases.

Self-reported data without verification. A completed vendor questionnaire is evidence that you asked — not evidence that you verified. Auditors increasingly expect independent corroboration of vendor claims, especially for certifications and security controls.

No periodic reassessment. Initial assessments without updates suggest a check-the-box approach. Document reassessment dates and triggers (annual cycle, material events, contract renewals).

Missing risk tiering. Treating all vendors identically — or not documenting why vendors are in different tiers — suggests your program lacks risk-proportional rigor. Document your tiering criteria and apply them consistently.

What a compliant CC9.2 evidence file looks like

A defensible CC9.2 evidence file contains: (1) a vendor inventory with risk tiers and assessment dates, (2) an assessment methodology document describing your process, sources checked, and tiering criteria, (3) individual vendor risk reports with source-cited findings and risk scores, (4) reviewer sign-off documenting who reviewed each assessment and their decision (approve, conditional approve, reject), and (5) reassessment schedule with evidence of completed periodic reviews. Each vendor report should link findings to specific sources — not just state conclusions. When an auditor asks "how do you know this vendor is low risk?" your answer should be the report, not your memory.

How ThirdProof generates CC9.2-ready documentation

ThirdProof produces audit-ready vendor risk assessments designed for CC9.2 compliance. Each investigation queries 24 intelligence sources in parallel — sanctions databases, business registries, threat intelligence feeds, certification registries, SEC filings, and more — and produces a PDF report with source-cited findings, deterministic risk scoring, methodology disclosure, and SHA-256 integrity seals. The report is formatted in compliance language that auditors expect. Combined with ThirdProof's review certification workflow (reviewer name, date, decision), each investigation creates a complete CC9.2 evidence unit. Run investigations for your full vendor inventory and you have a documented, source-cited, methodology-consistent vendor risk program that satisfies CC9.2 requirements.

See this in action

ThirdProof automates vendor risk assessment across 24 intelligence sources. Investigate any vendor in under 2 minutes — no questionnaires, no vendor cooperation required.

Try ThirdProof Free →

No credit card required

Frequently asked questions

Does ThirdProof satisfy SOC 2 CC9.2?+
Yes. ThirdProof generates the vendor risk assessment documentation that CC9.2 requires. Each investigation produces a PDF report with source-cited findings from 24 intelligence sources, deterministic risk scoring, and methodology disclosure. The reports have been accepted by Big 4 and regional auditors as CC9.2 vendor management evidence.
What does CC9.2 require for vendor management?+
CC9.2 requires organizations to assess risks associated with third-party service providers. In practice, auditors check for: a complete vendor inventory, documented risk assessments with evidence of due diligence, risk-proportional assessment depth, and periodic reassessment. The key requirement is documented evidence — not just a process, but proof it was followed.
How often should I reassess vendors for CC9.2?+
Best practice is annual reassessment for critical (Tier 1) vendors, every 18 months for important (Tier 2) vendors, and every 24 months for standard (Tier 3) vendors. Additionally, reassess any vendor immediately after a material event — data breach, acquisition, regulatory action, or significant service change. Document both the schedule and the triggers.
Can I use vendor questionnaires for CC9.2 evidence?+
Questionnaires provide one form of evidence, but auditors increasingly question self-reported data without independent verification. The strongest CC9.2 evidence combines vendor-provided information with independently gathered intelligence — sanctions screening, certification registry checks, cyber posture analysis, and adverse media scanning. ThirdProof handles the independent verification automatically.
What vendor documentation do SOC 2 auditors request?+
Auditors typically request: your vendor inventory with risk classifications, your assessment methodology document, individual vendor risk assessments (with supporting evidence), reviewer sign-off documentation, and your reassessment schedule with completion records. They may also request specific vendor reports for a sample of vendors to verify depth and consistency.
How many vendors do I need to assess for CC9.2?+
CC9.2 applies to all third-party service providers — every vendor that has access to your systems, data, or provides services critical to your operations. Most companies have 20-200 vendors in scope. The assessment depth should be proportional to risk: critical vendors get full assessment, standard vendors get basic screening. But every in-scope vendor needs at least documented assessment.

Put this into practice

Investigate any vendor across 24 intelligence sources in under 2 minutes. Your first 3 investigations are free.

Start Free Investigation →

No credit card required