Understand vendor assessment, selection, agreements, monitoring, and rules of engagement for the third-party-risk objectives on Security+.
Third-party risk exists because outside services, vendors, contractors, and partners can introduce security exposure long before an attacker appears. Security+ expects you to know that a popular vendor is not automatically a low-risk vendor. Assessment, contractual clarity, and ongoing monitoring still matter.
CompTIA usually wants you to connect four things:
The strongest answer rarely says “trust the vendor.” It says “verify the controls, define the boundaries, and monitor the relationship.”
Ask:
Those four questions usually point you to the strongest answer.
| Review area | Why it matters |
|---|---|
| Data handled | Shows privacy and confidentiality exposure |
| Access scope | Shows what blast radius the vendor could create |
| Security evidence | Shows whether the vendor can prove control maturity |
| Contract and SLA terms | Clarify obligations, response expectations, and accountability |
| Ongoing monitoring | Confirms the relationship stays acceptable over time |
1vendor: payroll-processor
2data_types:
3 - pii
4 - payroll
5access:
6 - sftp-upload
7 - no production admin
8required_evidence:
9 - security_questionnaire
10 - incident_notification_terms
11 - right_to_audit_or_equivalent_assurance
12review_cycle: annual
What to notice:
Cloud and SaaS providers often use shared-responsibility language. Security+ expects you to understand that shared responsibility does not mean “the vendor handles security.” It means boundaries must be understood and enforced. The organization still has to review access, monitoring, and response expectations carefully.
A company wants to use a SaaS vendor for storing regulated customer data. The vendor is well known, but the security team has not reviewed incident-notification obligations, access boundaries, or what evidence of control maturity is available. Which answer is strongest first?
A. Approve the vendor immediately because brand recognition lowers risk
B. Complete third-party due diligence, clarify contractual and notification obligations, and verify how the vendor’s controls align to the handled data and access scope
C. Share a permanent admin account so integration can start faster
D. Skip the review because the data will also be encrypted
Best answer: B. The strongest answer verifies scope, evidence, and accountability before sensitive-data onboarding.
Continue with 5.4 Security Compliance & Privacy to connect vendor oversight to legal and privacy obligations.