Structured, risk-based diligence for SMEs, fintech/regtech, and startups.
This guide provides general information to support vendor due diligence and contracting. It is not legal, regulatory, accounting, or risk advice, and it does not create a lawyer–client relationship. Laws and regulations vary by jurisdiction and evolve frequently, especially in financial services, privacy, cyber, and AI. You should obtain advice tailored to your circumstances, sector, and geography before taking or refraining from any action. Use of this guide is at your own risk; no representation or warranty is made as to completeness or fitness for a particular purpose.
Understanding legal identity, control, and footprint reduces counterparty, sanctions, and legal enforcement risks. Beneficial ownership checks help detect conflicts, corruption risks, and sanctions issues. Group structure and subcontracting affect data flows, service resilience, and governing law. Litigation history signals potential pattern risks. Governance maturity correlates with decision quality, internal control strength, and responsiveness in crises.
Corporate registry extracts, cap table or ownership attestation, organizational chart, director/PEP screening results, sanctions screening outputs, litigation/regulatory summary on letterhead, and tax registration certificates. Board/committee charters, recent board minutes (redacted), and corporate governance policy.
Seek consistency between public registries and vendor disclosures. Validate beneficial ownership using independent databases and check for PEP/sanctions hits. Evaluate whether governance structures are proportionate to company scale and risk. Consider whether group structure or cross‑border operations introduce enforcement or data transfer constraints.
Opaque or shifting ownership; nominee shareholders without rationale; links to sanctioned or high‑risk jurisdictions; frequent restructuring; material undisclosed litigation; absence of governance documentation; resistance to beneficial ownership verification.
Financial resilience and appropriate insurance indicate the vendor’s ability to deliver and to absorb losses or claims. Early‑stage companies may be strong technically but fragile financially; runway and contingency planning are critical. Insurance structure determines recovery prospects if something goes wrong. Concentration of cash or covenant pressure can become operational risk; robust treasury and contingency planning increase survivability.
Audited accounts or management accounts, bank reference or proof of funds (as appropriate), insurance certificates with wording summaries and endorsements, broker letter of authenticity. Schedule of covenants, management discussion and analysis, list of insurers and policy wordings (summaries), and solvency/contingency plan.
For startups, triangulate runway (cash/burn) against growth and hiring plans. Review covenant headroom and sensitivity to downside scenarios. Scrutinize insurance exclusions (e.g., war, failure to maintain security) against your risk profile. Consider insurer credit quality and notice of cancellation provisions.
Going‑concern qualifications; negative operating cash flow without credible funding path; narrow insurance limits relative to potential exposure; high deductibles or material exclusions for cyber or IP; reliance on a single bank or uncommitted credit; unwillingness to share broker attestations.
Unlicensed activity can trigger contractual illegality, regulatory penalties, and reputational harm. Robust compliance frameworks reduce enforcement and operational risks, especially in financial services and data‑intensive operations. Demonstrable monitoring, issue remediation, and regulatory engagement reduce residual risk.
License copies, regulatory letters, policy documents, training records, compliance monitoring plans, board minutes noting compliance reporting. Annual compliance plan, breach/issue logs, and remediation tracking.
Check licensing scope against the actual services and jurisdictions used in delivery. Validate supervisory interactions and review remediation evidence for closed findings. Evaluate compliance independence, resourcing, and authority.
Operating in gray areas without counsel analysis; material past findings with weak remediation; policy libraries without monitoring; compliance reporting into operations without escalation rights; lack of change management for new regulations.
Information security failures drive costly incidents, regulatory breaches, and outages. Independently audited controls provide assurance. Understanding architecture and process maturity helps evaluate likelihood and impact of compromise. Resilience to modern threats (e.g., ransomware, supply‑chain attacks) is a differentiator.
SOC 2 reports with management response, ISO certificates, pen test executive summaries, IR plan, security policies, incident logs/summary metrics, vulnerability scans, architectural diagrams (sanitized). BCP/DR test results focusing on cyber scenarios, IAM metrics (MFA coverage), and backup/recovery test reports.
Corroborate certifications (certificate numbers, dates, scope). Look for quantified control coverage (e.g., MFA ≥ 95% of privileged accounts). Review time‑to‑patch metrics and pen test remediation closure rates. Map cloud shared‑responsibility boundaries to contract obligations.
Expired or in‑progress certifications without dates; patch backlog; admin access without MFA; broad production access for contractors; no tabletop IR exercises; unclear ransomware playbooks; limited visibility into fourth‑party security.
Compliance with data protection laws is mandatory and high‑impact. Data flows and sub‑processing determine transfer risk. AI‑related data practices attract heightened scrutiny from regulators and enterprise customers. Transparency, minimization, and lawful bases are decisive in regulator evaluations and enterprise procurement.
Completed DPIAs, ROPA extracts, sub‑processor register, DPA schedule, SCCs, privacy policy, deletion certificates, data mapping diagrams, breach logs. DSR metrics (volumes, SLAs), training logs, and transfer impact assessments where applicable.
Check that roles (controller vs processor) are clearly defined and consistent with actual processing. Validate sub‑processor notifications and objection rights. Review breach post‑mortems and regulator correspondence for lessons learned and control upgrades. Ensure transfer mechanisms align to current law and guidance.
Unmapped data flows; vague sub‑processor lists; refusal of audit/inspection rights; broad rights to train models on your data without opt‑out; inadequate deletion/return terms; repeat breaches without systemic remediation.
Technology maturity and reliability underpin service quality and resilience. Poor SDLC and change control are leading causes of outages and vulnerabilities. OSS and API posture drive integration risk and legal exposure. Strong observability and disciplined operations reduce MTTR and customer impact.
Architecture diagrams, SDLC policy, SOC/SIEM dashboards screenshots, DR test reports, SLA reports, SBOM, OSS license register, API docs. Incident post‑mortems, SLO dashboards, and change approval records.
Examine SBOMs for high‑severity CVEs and patch latency. Check deprecation policies for backward compatibility windows. Validate API auth flows and rate limits against your expected volumes. Review post‑incident actions for systemic fixes, not just one‑offs.
No SBOM or OSS governance; frequent breaking changes; single‑tenant promises without isolation details; fragile release processes (e.g., no canary/rollbacks); limited run‑time telemetry; outdated libraries.
Resilience safeguards against outages and continuity failures. Proven testing and realistic recovery objectives reduce disruption to your operations and customers. Coordinated crisis and communications reduce secondary harm and regulatory exposure.
BCP/DR plans, BIA summary, test reports, resilience metrics, dependency registers, rota and succession plans. Crisis comms templates and after‑action reviews.
Check that RTO/RPO align with your business needs and contractual SLAs. Verify regular, scenario‑based testing (including cyber, cloud region loss, vendor outage). Evaluate cross‑functional participation and lessons‑learned implementation.
Plans untested or last tested >12 months; RTO/RPO not contractually backed; single‑region cloud deployments without failover; undocumented dependencies; hero‑culture reliance on key individuals.
Contracts allocate risk. Negotiating the right baseline prevents gaps that are expensive to fix once services are embedded. IP clarity avoids disputes and resale/scale constraints. Assurance rights and well‑drafted SLAs underpin enforceability and oversight.
Master services agreement (MSA), order forms, SOW templates, DPAs, acceptable use policy, open‑source attributions, escrow agreements, license audits policy. Sample SLA schedules, security/privacy appendices, and pro‑forma change control.
Map contractual positions to operational reality (e.g., SLA measurement, audit practicalities). Compare liability caps to credible exposure and ensure appropriate carve‑outs (e.g., data breach/IP/intentional misconduct). Check upstream constraints for pass‑through limitations that affect your intended use.
One‑sided liability caps below insurance; no indemnity for IP or data breach; broad disclaimers nullifying SLAs; refusal of reasonable audit rights; click‑wrap terms overriding negotiated terms; ambiguous ownership of outputs or data.
Transparent pricing avoids budget shocks and misaligned incentives. Renewal dynamics often drive total cost of ownership. Commercial levers provide recourse for underperformance. Clarity on exit costs prevents lock‑in.
Pricing sheets, sample invoices, renewal policies, calculation examples, and benchmarking comparisons where permitted. Change order pricing matrix and professional services rate cards.
Model TCO under realistic usage scenarios and growth. Stress‑test renewal clauses and indexation against inflation. Align credits with the severity of impact and ensure they do not operate as exclusive remedies.
Auto‑renewals with short notice; steep uplifts; ambiguous metrics (e.g., MAU definitions); punitive overage fees; separate charges for essential security features; non‑transparent export/transition fees.
People risks frequently underpin security, delivery, and regulatory failures. Strong culture and controls reduce error, fraud, and turnover impact. Proper screening, segregation of duties, and culture programs mitigate insider threats.
Org charts, HR policies, training logs, background check policy, contractor agreements, code of conduct. Access review summaries for privileged roles and whistleblowing policy usage metrics.
Cross‑check training completion and recertification cadence. Validate that contractors receive equivalent controls and training. Review attrition rates in critical teams and succession plans.
No screening for privileged roles; weak joiner/mover/leaver processes; cultural issues evidenced by whistleblowing inactivity or retaliation; heavy reliance on unsupervised contractors; high turnover in SRE/security.
ESG affects brand, stakeholder expectations, and— increasingly—legal obligations. For technology stacks, energy efficiency and ethical sourcing are material considerations. Governance integration signals seriousness and durability of commitments.
ESG policy, sustainability report, supplier code of conduct, modern slavery statement, certificates (e.g., ISO 14001), DC energy usage reports. Supplier audit results and corrective action plans.
Check targets for specificity and timelines. Validate data center energy claims with third‑party attestations. Review supplier codes for enforceable standards and remediation mechanisms.
Aspirational statements without metrics; Scope 3 avoidance where material; no supplier due diligence; greenwashing indicators; no governance ownership.
AFC failures carry acute regulatory and reputational consequences. For fintechs/regtechs, model risk and explainability are central. Data quality and governance are often root causes of detection failures and false positives.
Policies, enterprise risk assessments, system architecture, validation reports, sample MI/QA dashboards, SAR process documents. Model change logs, performance metrics over time, and independent validation reviews.
Review how typologies map to customer risk and geographies. Check governance for model approvals and periodic validations. Inspect quality assurance and SAR timeliness metrics.
Static rules without tuning; opaque models; outdated lists; inadequate QA; missing audit trails; high false positives without remediation; insufficient data provenance.
IP disputes can disrupt service and create significant liability. Clarity on third‑party rights and licensing keeps products deployable and defensible. Feedback/improvement rights affect long‑term competitiveness and lock‑in.
IP registers, license schedules, OSS register, indemnity clause excerpts, dataset provenance documentation. Patent/assignment agreements for key contributors and evidence of contractor IP assignments.
Trace ownership of core assets through assignments and contributor agreements. Assess OSS license compatibility. For AI, evaluate dataset provenance and any opt‑out or indemnity coverage for training on your data.
Gaps in contractor assignments; reliance on restricted datasets; copyleft contagion risk; narrow or eroding indemnities; broad vendor claims over your data/outputs; unclear feedback rights.
Your risk extends into the vendor’s supply chain. Visibility and control over fourth parties are now standard practice for regulators and enterprise customers. Geographic choices affect latency, compliance, and resilience.
Subcontractor register, sample flow‑down clauses, monitoring reports, termination playbooks. Sub‑processor change logs and notification history.
Check that flow‑downs mirror your contractual requirements. Review monitoring cadence (e.g., SOC reports collection, security questionnaires) and termination readiness for critical dependencies.
Undisclosed critical subcontractors; weak flow‑downs; sub‑processors in high‑risk jurisdictions; no contingency plans; frequent changes without notice.
Ethical lapses and irresponsible AI practices create legal and reputational risk. Governance signals maturity and long‑term viability. Effective speak‑up culture uncovers issues early.
Ethics policy, conflicts register process, AI governance charter, bias and robustness test summaries. Hotline metrics and investigation procedures.
Evaluate independence of ethics oversight and integration with compliance and risk. For AI, look for documented risk classifications, pre‑deployment reviews, and post‑deployment monitoring.
Paper policies without training; retaliation risks; no AI incident management; lack of data provenance for AI; absence of human oversight where required.
Measurable performance and transparent reporting enable accountability and timely remediation. Accurate definitions and measurement prevent disputes and ensure meaningful remedies.
SLA schedules, runbooks, incident communication templates, sample reports. Third‑party uptime attestations and methodology descriptions.
Ensure SLAs align to business outcomes (not just technical metrics). Validate independence of measurements. Review PIRs for root‑cause depth and prevention measures.
Overbroad exclusions; credits capped at trivial amounts; unverifiable measurements; lack of PIRs; opaque maintenance notifications.
Poor onboarding creates delays, scope creep, and security gaps. Clear governance and acceptance reduce friction and disputes. Favoring configuration over customization typically lowers long‑term cost and risk.
Project plans, RACI, acceptance test scripts, migration playbooks, training materials. Cutover plans and rollback procedures.
Assess realism of timelines and resource commitments. Validate change gates and criteria for acceptance. Review migration rehearsal results and rollback readiness.
Undefined acceptance criteria; heavy customization; unclear data migration ownership; missing rollback plans; reliance on a single SME.
Exit optionality and smooth transition mitigate lock‑in risk and ensure continuity if the relationship ends or your strategy changes. Practical transition support avoids service gaps and data loss.
Termination clause excerpts, transition schedules, data export specs, escrow agreements. Deletion certificates and sample transition runbooks.
Ensure export formats are practical and complete. Confirm deletion timelines and certificate forms. Validate escrow triggers and release mechanics for your risk scenarios.
High transition fees; partial data exports; short termination notice for convenience; escrow without workable build materials; deletion only on request with no certification.
Consistent risk scoring informs depth of diligence and cadence for ongoing monitoring. Alignment reduces friction and prevents blind spots. Transparent risk acceptance standards inform where contractual or monitoring enhancements are needed.
Risk register extracts, scoring methodology, board or risk committee materials. Open risk logs and remediation plans with target dates.
Check for calibration across domains and justification for residual risk ratings. Ensure monitoring cadence matches tiering and contractual obligations.
No formal methodology; persistent overdue remediation; arbitrary downgrades of inherent risk; lack of board visibility; acceptance of critical risks without compensating controls.
| Category | Documents to Request | Minimum Expectation | Red Flags |
|---|---|---|---|
| Corporate | Registry extracts, ownership attestations, org chart | Clear legal identity and ownership | Opaque ownership, PEP/sanctions links |
| Financial | Audited accounts or runway statement, insurance COIs | Solvency and fit‑for‑purpose insurance | Going‑concern issues, inadequate cyber cover |
| Regulatory | Licenses, policies, audit outcomes | All necessary authorisations | Enforcement actions, gaps in scope |
| Security | SOC 2/ISO 27001, pen test summaries, IR plan | Independent assurance and mature controls | No audits, weak IAM or patching |
| Privacy | DPA, DPIA, sub‑processor list, SCCs | Clear roles, lawful transfers | Unmapped data flows, breach history without remediation |
| Technology | Architecture, SDLC, SLA/uptime | Stable, documented stack | No DR testing, poor change control |
| Legal | MSA/SOW, IP chain, indemnities | Balanced risk allocation | Overbroad disclaimers, onerous lock‑in |
| Commercial | Price sheets, renewal terms | Transparent TCO and protections | Hidden fees, steep uplifts |
| People | HR/training policies, screening | Trained and vetted staff | Overreliance on unscreened contractors |
| ESG | Policies, reports, supplier code | Baseline ESG commitments | No policy or metrics |
| AFC | Policies, system validation | Effective controls | No SAR process, outdated lists |
Save as HTML for web, or print to PDF (A4) via your browser.