CYBERPULSE AI GRC: Vendor Risk Evaluator
On Sale
A$75.00
A$75.00
Description
Automates the intake, classification, and documentation of third-party vendors.
Evaluates vendor function, data access level, certification status, and applies AI-driven risk tiering (Low, Standard, Critical).
Ensures standardized onboarding and scalable due diligence.
Who It’s For
- Compliance and procurement teams onboarding vendors
- GRC consultants managing supply chain risk
- Security leads needing traceable vendor evidence
- Audit teams validating third-party controls
How It Works
- Trigger via intake form or webhook
- AI engine assigns vendor risk tier based on context (certification, access type, data sensitivity)
- If certifications (ISO 27001, SOC 2, IRAP, PCI DSS) are missing, status is flagged
- Scorecard is formatted automatically with vendor details, risk tier, and timestamp
- Logs results to Google Sheets for audit-ready evidence
- Sends instant alerts for high-risk or uncertified vendors
Requirements
- Google Sheets (OAuth2) connected for logging
- Gmail/SMTP node for automated alerts (optional)
- Intake form/webhook for vendor submissions
- Mandatory fields in vendor intake:
- Vendor Name
- Function
- Data Access
- Access Type (Read/Write/API)
- Certification (if any)
- Owner (GRC)
File Templates
- Vendor_Risk_Log.xlsx (auto-created sheet with audit-ready logs)
- Intake form (customizable, connects via webhook)
Customization Tips
- Modify AI prompt logic to reflect internal risk appetite
- Add more certification checks (e.g., ISO 27701, FedRAMP)
- Adjust alert thresholds (e.g., auto-notify only for Critical tier)
- Extend integration to Slack/Teams or SIEM for escalation
- Link logs to a dashboard for executive reporting
Compliance
- ISO/IEC 27001: Controls A.15.1.1, A.15.1.2 (supplier relationships and information security)
- SOC 2: Vendor management and risk classification
- NIST 800-53: SR-3, SR-5 (supply chain risk and contractual requirements)
- Essential Eight: Supports control validation via vendor documentation logging
- Provides timestamped, structured logs suitable for external audits
Setup Instructions
- Deploy the provided intake form or connect your own vendor submission process to the webhook.
- Connect Google Sheets to store vendor logs (Vendor_Risk_Log.xlsx).
- Connect Gmail/SMTP node for notifications (optional).
- Customize AI prompt and certification logic if needed.
- Run intake tests to validate risk tier assignment.
- Confirm vendor logs and alerts are recorded correctly.
Supports
- ISO 27001 Information Security
- SOC 2 Compliance
- PCI DSS v4.0
- NIST CSF / 800-53
- ACSC Essential Eight
- https://cyberpulsesolutions.com