The Complete GDPR Vendor Risk Assessment Questionnaire Framework for Multi-Entity Organizations
Most vendor assessments are inconsistent, incomplete, and impossible to track across subsidiaries. Here's how privacy teams at organizations with 5–50+ entities build a vendor risk assessment process that actually holds up under regulatory scrutiny.
GDPR Articles 28 and 32 require data controllers to assess and document the data protection practices of every processor they engage , and that obligation extends across every entity in your group structure. Most teams start with a spreadsheet or Word document, but that approach breaks down fast when you're managing hundreds of vendors across multiple jurisdictions. This page walks you through exactly what a robust questionnaire should include, the most common mistakes organizations make, and how leading privacy teams are automating the entire process.
What to Include in Your GDPR Vendor Risk Assessment Questionnaire
Nine essential categories that separate a defensible vendor assessment from a checkbox exercise. Each maps directly to GDPR Articles 28, 32, and 44–49.
Category 1
Vendor Identity and Processing Overview
Establish the basics: company details, processing role (processor, sub-processor, or controller), categories of personal data handled, data subjects affected, and a clear description of every processing activity. Without this foundation, every subsequent question is built on sand.
Result: Full processing inventory per vendor
Maps to GDPR Article 28(3) , required DPA content
Category 2
Legal Basis and Data Processing Agreement
Verify that a DPA meeting Article 28 requirements is signed and current. Confirm the legal basis for processing, identify any joint controller arrangements, and ensure the DPA covers all processing activities , not just the ones documented at contract signing.
Result: Legally defensible processor relationships
Maps to GDPR Articles 26 and 28 , controller-processor obligations
Category 3
International Data Transfers
Post-Schrems II, this is where most assessments are weakest. Document where data is stored and processed, which transfer mechanisms are in place (SCCs, adequacy decisions, BCRs), and whether a Transfer Impact Assessment has been conducted for each third-country transfer.
Result: Audit-ready transfer documentation
Maps to GDPR Articles 44–49 , cross-border transfer safeguards
Category 4
Technical and Organizational Measures
Assess encryption standards (at rest and in transit), access controls, pseudonymization practices, penetration testing frequency, incident response capabilities, and certifications like ISO 27001 or SOC 2. This is where you gauge whether the vendor's security posture matches the sensitivity of the data they process.
Result: Risk-calibrated security assessment
Maps to GDPR Article 32 , security of processing
Category 5
Sub-processor Management
Your vendor's vendors are your problem. Assess whether the vendor uses sub-processors, how they evaluate them, whether prior authorization is required before engaging new ones, and how changes are communicated. A vendor with undisclosed sub-processors is a compliance gap waiting to be found.
Result: Complete sub-processor chain visibility
Maps to GDPR Article 28(2) and 28(4) , sub-processor obligations
Category 6
Data Subject Rights Support
When a data subject submits an access, deletion, or portability request, your vendor must be able to respond within your required timeframe , not theirs. Assess their technical ability to locate, export, and delete personal data, and confirm contractual commitments to support your obligations under Articles 15–22.
Result: Guaranteed DSR response capability
Maps to GDPR Articles 15–22 and 28(3)(e) , data subject rights
Category 7
Breach Notification Process
Article 33 gives you 72 hours to notify your supervisory authority of a breach , and that clock starts when you become aware. Assess your vendor's breach detection capabilities, their committed notification timeframe to you, escalation procedures, and whether they have a documented history of past incidents.
Result: Enforceable breach notification SLAs
Maps to GDPR Articles 33 and 34 , breach notification obligations
Category 8
Data Retention and Deletion
Confirm the vendor's retention policies, deletion procedures upon contract termination, and whether they provide written certification of deletion. The most common audit finding in vendor assessments: no evidence that data was actually deleted when the relationship ended.
Result: Documented deletion with proof
Maps to GDPR Article 28(3)(g) , deletion obligations
Category 9
Audit Rights and Evidence
Determine whether the vendor permits audits (on-site or remote), what evidence they provide proactively . SOC 2 reports, ISO 27001 certificates, penetration test summaries , and whether audit provisions are contractually guaranteed, not just verbally promised.
Result: Continuous assurance, not blind trust
Maps to GDPR Article 28(3)(h) , audit and inspection rights
How to Score and Tier Your Vendor Risk Assessments
Not every vendor deserves the same scrutiny. A risk-tiered approach lets you allocate assessment depth proportionally , spending 80% of your effort on the 20% of vendors that pose the most risk. Here's a framework that works across multi-entity organizations.
High Risk . Score 75–100
75–100
Full Assessment Required
Vendors processing special category data, large-scale personal data, or data involving cross-border transfers to non-adequate countries. These require all nine questionnaire categories, annual reassessment, and contractual audit rights.
- Payroll processors across multiple jurisdictions
- Cloud infrastructure hosting personal data
- Healthcare data processors
- HR platforms with employee sensitive data
Medium Risk . Score 40–74
40–74
Standard Assessment
Vendors processing personal data in a limited scope , contact details, business email addresses, or pseudonymized analytics data. Assess core categories (1–5, 7, 8) with biennial reassessment cycles.
- CRM platforms with customer contact data
- Email marketing providers
- Project management tools with user accounts
- Customer support ticketing systems
Low Risk . Score 0–39
0–39
Lightweight Assessment
Vendors with minimal or no personal data access , anonymized data only, no direct data subject interaction, or purely internal tooling without personal data processing. Categories 1–2 plus a DPA check may suffice.
- Office supply vendors with no data access
- Analytics tools processing fully anonymized data
- Infrastructure monitoring with no PII
- Design or development tools without user data
200+
Hours saved on compliance prep
Medtec saved 200+ hours preparing for ISO 27001 by replacing manual evidence gathering with automated compliance workflows , in their first year on Priverion.
100%
Vendor risk assessment coverage
Zurzach Care went from partial vendor oversight to 100% vendor risk assessment coverage across all entities after deploying Priverion's automated assessment workflows.
60%
Reduction in compliance admin time
Aircraft manufacturer cut compliance admin time by 60% in their first 6 months , including full onboarding, migration, and automated ROPA recertification across subsidiaries.
Six Mistakes That Make Vendor Risk Assessments Indefensible
Supervisory authorities aren't just checking whether you did an assessment , they're checking whether it was meaningful. These are the patterns that turn a reasonable compliance effort into an enforcement target.
Mistake 1
One-size-fits-all questionnaires
Sending the same 80-question form to a cloud infrastructure provider and a catering company. Without risk tiering, vendors either drown in irrelevant questions or receive assessments too shallow to be useful. The result: vendor fatigue and low completion rates across the board.
Mistake 2
Assess once, forget forever
Conducting a vendor assessment at onboarding and never reassessing. Vendors change sub-processors, hosting locations, and security practices. An assessment from 2021 tells you nothing about a vendor's 2024 risk profile. High-risk vendors need annual reassessment at minimum.
Mistake 3
Ignoring sub-processor chains
Your vendor says they're GDPR-compliant, but their sub-processor routes data through a US-based CDN with no SCCs. Article 28(2) requires specific or general prior authorization for sub-processors , and you're accountable for the entire processing chain, not just your direct relationship.
Mistake 4
No centralized tracking across entities
Subsidiary A assessed a vendor in March. Subsidiary B engages the same vendor in June and starts from scratch , or worse, doesn't assess at all. Without a group-wide vendor registry, you're duplicating effort and creating inconsistent risk profiles for the same processors.
Mistake 5
Collecting answers without scoring risk
A completed questionnaire is not a risk assessment. If you're not converting vendor responses into a risk score , and comparing that score against your risk appetite , you're just filing paperwork. Auditors want to see that you evaluated risk and made documented decisions based on the findings.
Mistake 6
No evidence of follow-up on deficiencies
You identified that a vendor lacks encryption at rest in their assessment response. Then... nothing. Supervisory authorities specifically look for documented remediation actions , risk acceptance decisions, contractual requirements for improvement, or vendor offboarding where risks are unacceptable.
How Leading Privacy Teams Automate Vendor Risk Assessments
Spreadsheet-based vendor assessments work until you hit 20 vendors, 3 entities, or your first audit. Here's what changes when you move to a purpose-built vendor risk management workflow.
Centralized vendor registry across all entities
Every vendor relationship , across every subsidiary and jurisdiction , visible in a single registry. When Subsidiary A assesses a vendor, Subsidiary B inherits that assessment and can extend or customize it for their specific processing activities. No duplication, no gaps.
Risk-tiered questionnaire distribution
Automatically assign questionnaire depth based on the vendor's risk tier. High-risk vendors receive the full nine-category assessment. Low-risk vendors get a lightweight verification. Vendors complete assessments directly within the platform , no more email chains and lost attachments.
AI-assisted risk scoring and flagging
AI reviews vendor responses and flags potential concerns , missing encryption details, undisclosed sub-processors, transfer mechanism gaps , for human review. The AI assists your assessment; your privacy team makes the final decision. No customer data is used for model training.
Automated reassessment cycles
Set reassessment frequencies by risk tier , annual for high-risk, biennial for medium , and the system handles reminders, distribution, and escalation automatically. AXA achieved 100% ROPA recertification rates using this same automated recertification approach for their vendor assessments.
AXA , 100% ROPA recertification rate, fully automated
Audit-ready evidence packages
Generate complete vendor assessment documentation for supervisory authorities in minutes , assessment history, risk scores, remediation actions, DPA status, and transfer impact assessments. Medtec saved 200+ hours on ISO 27001 preparation using this exact capability.
Medtec , 200+ hours saved in first year
Board-ready compliance dashboards
Real-time visibility into vendor risk posture across all entities , how many vendors assessed, current risk distribution, overdue reassessments, and open remediation items. CISOs and Heads of Legal get the oversight they need without requesting manual reports from every subsidiary DPO.
Enterprise-grade without enterprise complexity
Mid-market companies don't need a platform built for Fortune 50 compliance teams with Fortune 50 budgets. They need one that actually fits how they work.
The typical enterprise platform
Per-user, per-module pricing
Costs balloon unpredictably as you add subsidiaries, users, or modules. Budget conversations become negotiations.
US-hosted infrastructure
Post-Schrems II, US hosting creates ongoing legal exposure for European data transfers. Additional SCCs and TIAs required just for your compliance tool itself.
12-month implementation
Dedicated integration teams, professional services engagements, and months before your first ROPA is even migrated.
Feature overload
ESG, ethics hotlines, cookie consent, and dozens of modules you'll never touch , but you're paying for them anyway.
200 shallow integrations
Impressive on a comparison slide. In practice, most break during updates and create maintenance overhead your team absorbs.
Priverion
Predictable, all-inclusive pricing
Based on number of entities and organizational size , not per-user or per-module. Add team members without recalculating your budget.
Swiss-built, Swiss-hosted
All data processing within Swiss infrastructure. European data residency isn't a checkbox . it's our architecture. Your compliance tool should never be a compliance risk.
Operational in weeks, not months
Aircraft manufacturer achieved a 60% reduction in compliance admin time within their first 6 months , including full onboarding and migration.
Aircraft manufacturer, first 6 months post-deployment
Purpose-built for privacy
ROPA, DPIA/TIA, vendor risk, incident management, DSR handling, and AI Act readiness , everything a privacy program needs. Nothing it doesn't. We don't cover ESG or cookie consent, and that's by design.
Deep integrations where it matters
HR, procurement, IT asset management , the systems that actually drive privacy workflows. Fewer connectors, zero maintenance headaches.
Download the GDPR Vendor Risk Assessment Questionnaire Template
A ready-to-use questionnaire covering all nine categories , formatted for immediate deployment across your vendor portfolio. Built from the frameworks used by multi-entity organizations managing compliance across dozens of subsidiaries.
We'll send the template to your inbox. No spam, no sequences , just the template and one follow-up asking if it was useful.
- All nine assessment categories with specific questions
- Risk scoring rubric with tiered assessment guidance
- GDPR article mapping for each question category
- Sub-processor chain assessment checklist
- Reassessment schedule template by risk tier
Stop managing vendor risk in spreadsheets
See what group-wide vendor risk management looks like when it actually works
In 30 minutes, we'll walk through how organizations like Zurzach Care achieved 100% vendor risk assessment coverage across every entity , and how Aircraft manufacturer cut compliance admin time by 60% in their first six months. No slides. No sales pitch. Just the platform, your questions, and an honest conversation about fit.
Weeks, not months
Time to go live
Swiss-hosted
European data residency
No per-user pricing
Predictable costs that scale
No commitment required. We'll tell you honestly if Priverion is the right fit , or point you somewhere better.


