๐Ÿ“Š Scoring Methodology

Understanding the weighted risk calculation and compliance rating system

How Scoring Works

The Vendor Risk Assessment Tool uses a weighted scoring algorithm to calculate accurate risk ratings. Unlike simple yes/no checklists, our system accounts for the criticality of each security control.

Question Weights (1-5)

Weight Criticality Example Controls
5 Critical MFA, Data Encryption, Incident Response Plan, CISO Role
4 High Access Reviews, Vulnerability Scanning, Security Training
3 Medium Password Policies, Log Retention, Physical Security
2 Low Visitor Logs, Asset Labeling, Policy Review Frequency
1 Minimal Documentation Standards, Awareness Posters

Answer Types & Point Allocation

โœ…

Yes

Full credit awarded

100% of weight
โš ๏ธ

Partial

Control exists but incomplete

50% of weight
โŒ

No

Control not implemented

0 points

N/A (Not Applicable): Questions marked as N/A are excluded from both the achieved and maximum score calculations.

Score Calculation Formula

Compliance Score = (Achieved Points รท Maximum Points) ร— 100
Higher percentage = Better security posture

Achieved Points

  • โ€ข "Yes" answers: Full question weight
  • โ€ข "Partial" answers: 50% of weight
  • โ€ข "No" answers: 0 points
  • โ€ข Sum all achieved points

Maximum Points

  • โ€ข Sum of all question weights
  • โ€ข Excludes N/A questions
  • โ€ข Represents perfect score (100%)

Example Calculation

Scenario: Quick Due Diligence (10 questions)

Question Weight Answer Points
Is MFA enabled? 5 โœ… Yes 5.0
Is data encrypted? 5 โœ… Yes 5.0
Security patches in 30 days? 4 โš ๏ธ Partial 2.0
Incident response plan? 4 โœ… Yes 4.0
Daily backups tested? 5 โŒ No 0.0
Relevant certifications? 3 โš ๏ธ Partial 1.5
Annual security training? 4 โœ… Yes 4.0
90-day log retention? 3 โœ… Yes 3.0
Vendor assessments? 3 โŒ No 0.0
BAA/DPA signing? 5 โœ… Yes 5.0
Achieved Points
29.5
Maximum Points
41
Compliance Score
71.95%
โš ๏ธ Medium Risk

Risk Rating Bands

๐ŸŸข
Low Risk (85-100%)

Strong security posture with comprehensive controls

โœ“
๐ŸŸก
Medium Risk (60-84%)

Acceptable with remediation plan for gaps

โš 
๐Ÿ”ด
High Risk (0-59%)

Significant security deficiencies requiring immediate attention

โœ—

Assessment Best Practices

  • โœ“
    Request Evidence: Ask vendors to provide documentation (policies, certifications, audit reports) to support their answers.
  • โœ“
    Use "Partial" Wisely: Reserve for controls that exist but have known gaps (e.g., MFA enabled for some users but not all).
  • โœ“
    Add Context Notes: Use the evidence/notes field to document specific findings or follow-up items.
  • โœ“
    Re-Assess Annually: Security posture changes over time. Schedule annual reassessments for critical vendors.
  • โœ“
    Adjust Weights: Customize question weights in the Template Builder to match your organization's risk tolerance.