Cybersecurity Vendor Risk Assessment Document

1. Vendor Information

2. Assessment Details

3. Security Controls Checklist

Control Implemented Notes
Data Encryption in Transit
Data Encryption at Rest
User Access Control
Incident Response Plan
Regular Security Audits
Antivirus/Malware Protection

4. Risk Evaluation

5. Additional Comments