The Shared Assessments Standard Information Gathering (SIG) questionnaire is a unified standard for assessing vendor risk across a multitude of topical domains. There are two versions of the survey, SIG Core and SIG Lite, with substantially different numbers of questions between these two surveys and distinct levels of detail.
SIG Core is an extensive assessment with 627 questions covering 21 risk categories. SIG Lite includes 128 questions and typically serves vendors that require less due diligence or are not as critical. (There’s even a full SIG, SIG Detail, coming in at a very comprehensive 1,936 questions.)
Mitratech is a licensee for these SIG questionnaires and includes both in the Prevalent Third-Party Risk Management solution.
Standard Information Gathering (SIG) 2025: The Definitive Guide
Discover how key SIG 2025 changes can influence your vendor risk assessment process.
Although no new risk domains were added, the 2025 version added new questions for incident management and operational resilience, increased the number of standards mappings, and included new regulatory matters.
The SIG 2025 expanded existing risk domains, particularly within:
Along with adding questions in key control areas, the most important update to the 2025 SIG questionnaire was the addition of new content related to distinct compliance standards. This reflects the broader evolution in third-party risk. Adding these content mappings acknowledges the increasingly complex landscape that companies operate within and need to ask their vendors about.
The three net-new standards mappings available in the 2025 SIG are:
The Digital Operational Resilience Act (DORA), which will take full effect in January 2025, is designed to ensure that the European financial sector can maintain resilience during severe operational disruptions. DORA creates a regulatory framework for digital operational resilience in the financial sector, under which all firms must confirm that they can withstand, respond to, and recover from a wide range of ICT disruptions and cyber threats.
The Act sets uniform requirements for the security of network and information systems. It spells out requirements in Chapter V for critical third parties that provide information communication technologies (ICT) services, such as cloud platforms or data analytics services, to the financial services industry.
Under DORA, organizations must classify incidents, enable transparent incident reporting, and develop a structured risk management framework, which includes testing tools, systems, and processes. In the SIG 2025 questionnaire, control J.11 asks if the organization has outsourced its incident reporting responsibilities to a third-party service provider to address DORA Article 18, which requires financial entities to report major ICT-related incidents to the relevant competent authority.
Since its release in 2024, the latest version of NIST CSF has become a benchmark for organizations seeking guidance and best practices to improve their supply chain security and cybersecurity operations. NIST CSF closely aligns with NIST 800-53, which is already engrained within the SIG.
NIST CSF 2.0 added a new Governance Function, increased roles for legal and compliance teams, and provided enhanced guidance on supply chain risks. Particularly relevant for third-party risk management, the introduction of the Governance Function illustrates how critical cybersecurity governance is to managing and reducing cybersecurity risk in supply chains. A dedicated governance Function helps align and integrate third-party cybersecurity activities and processes across third-party risk management, enterprise risk management, and legal teams, which prompted its inclusion in the latest SIG 2025 questionnaires.
Recognizing that vulnerabilities within supply chains can compromise the security of essential services, the European Union adopted the Network and Information Security Directive 2 (NIS2) in December 2022. NIS2 mandates that organizations implement robust measures to manage and mitigate risks associated with their third-party relationships. The NIS2 Directive went into effect in October 2024. Mappings to NIS2 were added to the SIG 2025 to accommodate NIS2 requirements to:
For example, SIG 2025 controls C.11, and C.12 were added to address NIS Directive Article 29, which requires exchanging cybersecurity information related to cyber threats, near misses, vulnerabilities, techniques, and procedures.
The addition of operational resilience and supply chain security mappings to the 2025 SIG questionnaire reflects the emphasis on the cybersecurity and supply chain risks that are permeating the modern business landscape. Organizations are seeing more third-party data breaches, necessitating a full understanding of the cybersecurity supply chain.
The SIG 2025 questionnaire endeavors to answer some of these concerns while providing peace of mind from understanding the controls built into your suppliers’ defenses. As the regulatory environment shifts globally, SIG will likely add more content mappings in the next year.
Mitratech offers the SIG Core and SIG Lite questionnaires, along with over 800 other standards-based assessment templates, as part of the Prevalent Third-Party Risk Management solution. This library of templates enables Mitratech customers to leverage shared data and streamline the risk questionnaire process.
Along with these assessments, the Prevalent solution adds process automations, reporting, compliance mapping, and built-in remediation guidance to streamline third-party risk management. Part of the problem with TPRM is understanding how to resolve issues that arise. With the Prevalent solution’s remediation guidance, resolving the issue is no longer as challenging.
Finally, the Prevalent solution also includes continuous monitoring intelligence to help you monitor ongoing risks in your third-party ecosystem. It’s nearly impossible for any TPRM program manager to keep up with all possible risks themselves, which is why the Prevalent solution does it for you.
Download the SIG 2025 Definitive Guide to better understand how to apply the SIG questionnaire in your TPRM program, or request a demo today to discover how the Prevalent solution can power your TPRM program.
Effectively manage third-party cybersecurity incidents with a well-defined incident response plan.
09/24/2024
Why third-party breaches are on the rise, who is being affected, and what you can do...
09/20/2024
Use these 6 tips to improve your third-party breach response procedures.
09/17/2024