Your Cart
Loading
Only -1 left

CYBERPULSE AI GRC: Vendor Risk Evaluator

On Sale
A$75.00
A$75.00
Added to cart

Description

Automates the intake, classification, and documentation of third-party vendors.

Evaluates vendor function, data access level, certification status, and applies AI-driven risk tiering (Low, Standard, Critical).

Ensures standardized onboarding and scalable due diligence.

Who It’s For

  • Compliance and procurement teams onboarding vendors
  • GRC consultants managing supply chain risk
  • Security leads needing traceable vendor evidence
  • Audit teams validating third-party controls

How It Works

  • Trigger via intake form or webhook
  • AI engine assigns vendor risk tier based on context (certification, access type, data sensitivity)
  • If certifications (ISO 27001, SOC 2, IRAP, PCI DSS) are missing, status is flagged
  • Scorecard is formatted automatically with vendor details, risk tier, and timestamp
  • Logs results to Google Sheets for audit-ready evidence
  • Sends instant alerts for high-risk or uncertified vendors

Requirements

  • Google Sheets (OAuth2) connected for logging
  • Gmail/SMTP node for automated alerts (optional)
  • Intake form/webhook for vendor submissions
  • Mandatory fields in vendor intake:
  • Vendor Name
  • Function
  • Data Access
  • Access Type (Read/Write/API)
  • Certification (if any)
  • Owner (GRC)

File Templates

  • Vendor_Risk_Log.xlsx (auto-created sheet with audit-ready logs)
  • Intake form (customizable, connects via webhook)

Customization Tips

  • Modify AI prompt logic to reflect internal risk appetite
  • Add more certification checks (e.g., ISO 27701, FedRAMP)
  • Adjust alert thresholds (e.g., auto-notify only for Critical tier)
  • Extend integration to Slack/Teams or SIEM for escalation
  • Link logs to a dashboard for executive reporting

Compliance

  • ISO/IEC 27001: Controls A.15.1.1, A.15.1.2 (supplier relationships and information security)
  • SOC 2: Vendor management and risk classification
  • NIST 800-53: SR-3, SR-5 (supply chain risk and contractual requirements)
  • Essential Eight: Supports control validation via vendor documentation logging
  • Provides timestamped, structured logs suitable for external audits

Setup Instructions

  1. Deploy the provided intake form or connect your own vendor submission process to the webhook.
  2. Connect Google Sheets to store vendor logs (Vendor_Risk_Log.xlsx).
  3. Connect Gmail/SMTP node for notifications (optional).
  4. Customize AI prompt and certification logic if needed.
  5. Run intake tests to validate risk tier assignment.
  6. Confirm vendor logs and alerts are recorded correctly.

Supports


You will get the following files:
  • PDF (4KB)
  • MD (3KB)
  • XLSX (6KB)
  • JSON (15KB)