Vendor Access Governance: Audit Worksheet for Security Teams
A practical vendor access governance audit worksheet plus step-by-step process, templates, and nursing home examples to cut risk and speed audits.
By CyberReplay Security Team
TL;DR: Use this vendor access governance audit worksheet to find and remove high-risk third-party access in a single pass - reduce audit time by 30-60% and close critical vendor exposures within 48-72 hours when paired with an MSSP or MDR partner.
Table of contents
- Quick answer
- Why vendor access governance matters now
- Audit worksheet overview
- Pre-audit preparation checklist
- Audit worksheet template - fillable table
- How to run the audit - step-by-step
- Example: Nursing home scenario
- Common objections and how to handle them
- Automation snippets and evidence collection
- Metrics and expected outcomes
- References
- What should we audit first?
- How often should we run this worksheet?
- Can we automate vendor access reviews?
- Who should sign off on remediation?
- How do we handle a vendor that refuses to cooperate?
- Get your free security assessment
- Next step - recommended operational move
- When this matters
- Definitions
- Common mistakes
- FAQ
Quick answer
Vendor access governance audit worksheet is a one-page operational tool security teams use to inventory third-party access, verify least privilege, validate contractual controls, and produce evidentiary output for compliance and incident response. Use the template below to run focused monthly or quarterly reviews, automate evidence collection where possible, and escalate high-risk findings to your security operations or managed detection and response provider for fast remediation.
Why vendor access governance matters now
Third-party access is a dominant cause of breaches and operational outages in regulated industries. In healthcare and long-term care - including nursing homes - third-party access to electronic health records, remote maintenance consoles, and clinical devices creates direct patient safety and regulatory exposure.
- Cost of action versus inaction - A breached vendor connection can cause hours to days of downtime, regulatory fines, and reputational harm. Industry breach studies and healthcare guidance underline that vendor compromise increases incident impact and investigation time. See external guidance from NIST and HHS in References.
- Who this is for - Security teams, IT managers, compliance officers, and procurement leads who must reduce vendor-related exposure without adding unsustainable manual work.
- What this is not - This worksheet is not a long-term vendor management program replacement. It is a focused, tactical instrument to discover, verify, and remediate access quickly.
Audit worksheet overview
This worksheet organizes vendor access reviews into three practical phases:
- Inventory and verification - Find active vendor accounts and access mechanisms.
- Evidence and control check - Confirm contract terms, MFA, network segmentation, and logging are implemented.
- Remediation and validation - Revoke, rotate, or scope access and record evidence for auditors and incident responders.
Each row in the worksheet is an actionable ticket: owner assigned, evidence attached, and SLA recorded for remediation.
Pre-audit preparation checklist
- Identify scope - Decide which vendors and systems are in scope this cycle. Prioritize vendors with privileged network, EMR, or device access.
- Pull identity and access exports - From IAM, Azure AD, Okta, or your provider of record, export guest accounts, service principals, and API keys dated within the review window.
- Pull network access lists - VPN, jump-hosts, firewall exceptions, and ZTNA policies.
- Pull logging and session data - RDP sessions, VPN logs, and vendor-specific access sessions for the review period.
- Gather contracts and SLAs - Note termination clauses, notice periods, and security controls required.
- Assign owners - Map each vendor to a business owner and a technical owner responsible for remediation.
Time estimate: preparation 1-2 days for medium environments. With automation and a managed partner, prep can shrink to a few hours.
Audit worksheet template - fillable table
Use this table as the core worksheet. Export to CSV or an issue tracker and run one row per discrete access record found.
| Vendor | System / Resource | Access Type | Account / Credential | Privilege level | Last access (UTC) | Evidence (log file / screenshot) | Contract controls (MFA / segmentation) | Risk (Low / Medium / High) | Action required | Owner | SLA target |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Acme EMR Support | EMR Admin Portal | Remote console | vendor.support@acme.com | Admin | 2025-02-12 14:03 | logs/EMR_acme_0212.json | MFA enabled, no segmentation | High | Remove admin, create scoped support account | IT Ops | 48 hours |
| HVAC Co | Building HVAC SCADA | VPN + SSH | svc-hvac-01 | Service account | 2025-02-05 02:10 | logs/hvac_ssh_0205.log | No MFA, VPN full network access | High | Rotate creds, implement network segmentation | Facilities / IT | 72 hours |
Copy the header above into a CSV or ticketing system. Each row must have a remediation SLA and an evidence artifact.
How to run the audit - step-by-step
Follow this process to run the worksheet end-to-end in a single 2-5 day sprint depending on environment size.
-
Triage and prioritization - Focus first on accounts with elevated privileges, persistent service credentials, and out-of-hours activity. Use logs to sort by anomalous sessions.
-
Confirm identity - Verify each account is a legitimate vendor identity and map to a contract entry. If no contract control exists, escalate to procurement and mark as High risk.
-
Validate controls - Check MFA, conditional access, scope of network access, and whether the vendor uses jump hosts or direct RDP. If MFA is not enforced for privileged vendor accounts, mark for immediate remediation.
-
Remediation actions - Typical remediation items include:
- Revoke unnecessary administrative rights.
- Replace persistent service credentials with short-lived tokens.
- Apply time-bound access windows and just-in-time access where possible.
- Enforce MFA and conditional access for vendor accounts.
-
Evidence and audit trail - Attach log snippets and screenshots showing account termination or privilege removal. This is required for compliance evidence and for incident response investigations.
-
Validation - Re-run log queries to confirm access is no longer possible and close the ticket when evidence shows access removal and successful validation.
-
Lessons learned - After each cycle, update vendor onboarding and procurement controls to prevent recurrence.
Example: Nursing home scenario
Problem - A nursing home uses a third-party medication management service with remote maintenance access. An overnight vendor maintenance session triggered abnormal API calls to the EMR, causing partial outage and delayed medication reconciliation.
What the audit found:
- Vendor used a single long-lived account for multiple facilities.
- No MFA and full network access via a VPN tunnel.
- No contract clause enforcing session logging retention.
Actions taken using the worksheet:
- Scoped vendor to a single facility and created per-site support accounts.
- Replaced VPN access with a ZTNA connector that limits traffic to the medication management API.
- Enabled conditional access and required MFA for vendor sessions.
- Added logging retention clause and quarterly access reviews to the vendor contract.
Outcome - The nursing home reduced the vendor attack surface and restored safe operations within 36 hours. Monthly audit time dropped from 6 hours to about 2.5 hours for that vendor because of scoped accounts and better logging.
Common objections and how to handle them
Objection: “We can’t disrupt vendor work - they need immediate access.”
- Response: Offer a scoped, time-bound support account or a just-in-time access model. This keeps vendor productivity while removing standing privileged access. Track requests in the worksheet with short SLAs and recorded approvals.
Objection: “Procurement won’t agree to new contract clauses.”
- Response: Start with operational controls you can apply immediately - MFA and ZTNA - and escalate contract changes to the next renewal. Use remediation evidence from the worksheet to justify procurement action.
Objection: “We don’t have staff to run these audits.”
- Response: This is where an MSSP or MDR partner can help. Managed providers can run recurring reviews and feed results into your ticketing system so your team only acts on verified high-risk items. See managed options at https://cyberreplay.com/managed-security-service-provider/ and https://cyberreplay.com/cybersecurity-services/.
Automation snippets and evidence collection
Here are practical automation examples to accelerate collection and produce repeatable evidence. Adapt these to your environment and log formats.
Sample CSV header to import into a ticketing system:
Vendor,System,AccessType,Account,PrivilegeLevel,LastAccessUTC,EvidencePath,ContractClause,Risk,Action,Owner,SLA
Azure AD - list guest vendor accounts (PowerShell):
# Requires AzureAD module
Connect-AzureAD
Get-AzureADUser -All $true | Where-Object {$_.UserType -eq 'Guest'} | Select DisplayName,UserPrincipalName,AccountEnabled | Export-Csv vendors-guests.csv -NoTypeInformation
Linux jump host - show last logins for vendor accounts (bash):
# show last logins for users matching vendor prefix
last | grep vendor_ | head -n 200 > vendor_lastlogins.txt
Example log evidence extraction using jq for JSON logs:
# filter vpn logs for vendor IP and time range
jq '. | select(.user | test("vendor@")) | {time: .timestamp, user: .user, action: .action}' vpn-logs.json > vendor_sessions.json
SIEM query example - identify vendor RDP activity outside business hours:
SELECT user, dst_host, timestamp
FROM events
WHERE event_type = 'rdp_session'
AND user LIKE '%vendor%'
AND (timestamp::time < '07:00:00' OR timestamp::time > '20:00:00')
ORDER BY timestamp DESC
Attach these outputs to the worksheet row as the EvidencePath. If your SIEM supports automated playbooks, trigger a remediation runbook for High risk items.
Metrics and expected outcomes
Use these baseline estimates when planning cycles and communicating to leadership. Real results depend on environment size and tooling maturity.
- Time savings for audit admin work - 30-60% when using automation to pull entries and a standard worksheet to triage results.
- Remediation speed for High risk vendor access - target 24-72 hours with clear owner assignment and managed support.
- Reduction in standing privileged vendor accounts - expect 60-90% reduction by replacing shared long-lived accounts with scoped, per-site, or just-in-time access.
- Incident investigation time reduction - 20-40% when vendor session logs and evidence are collected proactively.
Tie these metrics to business outcomes - reduced downtime, fewer regulatory escalations, and lower remediation labor costs.
References
- NIST SP 800-161 Rev. 1 - Supply Chain Risk Management Practices for Federal Information Systems and Organizations - Guidance on contractual and technical controls for third parties.
- NIST SP 800-207 - Zero Trust Architecture - Zero Trust principles for least privilege and microsegmentation used in vendor access governance.
- CISA - Third-Party Risk Management Resources - Federal playbooks and practical guidance for assessing and mitigating vendor risk.
- HHS OCR - Sample Business Associate Agreement Provisions (HIPAA) - Contractual clauses and vendor obligations for healthcare providers.
- CIS Controls - Service Provider Management (Control 15) - Control mappings and recommended practices for managing service providers.
- Microsoft Learn - What is Azure AD B2B collaboration? - Vendor identity and guest-account best practices for Azure environments.
- Verizon DBIR 2023 - Data Breach Investigations Report (Supply Chain and Third-Party) - Empirical data on breaches involving third parties to support prioritization.
- IBM Security - Cost of a Data Breach Report 2023 - Industry benchmarking for breach costs and vendor related incident impact.
- UK NCSC - Supply Chain Security Guidance - Supplier and third-party security recommendations aligned to contractual and technical controls.
- ENISA - ICT Supply Chain Security - European guidance and reports on ICT supply chain and third-party risk.
What should we audit first?
Start with vendors that have any of the following - they should be audited first:
- Privileged access to EMR, financial systems, backup infrastructure, or building controls.
- Long-lived credentials or shared accounts.
- Access that bypasses normal network segmentation.
- Vendors that recently had a security incident.
Use the worksheet to capture the reason for priority so reviewers understand the business risk.
How often should we run this worksheet?
- High-risk vendors - monthly.
- Medium-risk vendors - quarterly.
- Low-risk vendors - biannually or at contract renewal.
If you are using a managed provider, schedule automated reviews and a human review cadence that matches your risk appetite.
Can we automate vendor access reviews?
Yes. Automation reduces manual effort and produces consistent evidence. Common automation points are:
- Identity exports from cloud IAM providers.
- SIEM queries for vendor sessions.
- Scheduled scripts to extract VPN and RDP logs.
- Ticket generation into a remediation queue when a high-risk pattern is detected.
Automation is complementary to human verification. Use automated triage to reduce toil and keep humans focused on exceptions.
Who should sign off on remediation?
Sign-off should be a joint decision between a technical owner and a business owner. For regulated environments such as nursing homes, include a compliance representative where contractual or regulatory exposure exists. The worksheet should capture final sign-off name, title, and timestamp for audit integrity.
How do we handle a vendor that refuses to cooperate?
- Escalate to procurement and legal - documented non-cooperation is a contractual risk and must be elevated.
- Implement compensating controls - block or segment the vendor to limit exposure while the vendor is investigated.
- Consider emergency termination if the vendor is a clear, present threat and contracts permit it.
- Document all steps in the worksheet to preserve an evidentiary trail.
Get your free security assessment
If you want practical outcomes without trial and error, schedule your assessment and we will map your top risks, quickest wins, and a 30-day execution plan. If you prefer a short diagnostic first, try CyberReplay’s free scorecard to get a prioritized vendor access snapshot: Get the scorecard. For immediate help with an incident or tight timelines, see CyberReplay’s hands-on help options: Cybersecurity help and incident response.
Next step - recommended operational move
Run one scoped pilot audit using this worksheet covering your top 3 high-risk vendors. If staff bandwidth is limited or you want guaranteed speed-to-remediation, engage a managed detection and response or managed security service provider to run and remediate findings. CyberReplay offers managed security and response services that can run recurring vendor access reviews, provide evidence packages for compliance, and act immediately on high-risk findings. Learn more about managed options at https://cyberreplay.com/managed-security-service-provider/ and get help for urgent incidents at https://cyberreplay.com/help-ive-been-hacked/.
When this matters
This worksheet matters whenever third-party access could affect confidentiality, integrity, or availability. Typical triggers:
- Regulatory environments with sensitive data such as healthcare, finance, or critical infrastructure.
- Recent vendor security incidents or industry alerts about a vendor product.
- Discovery of shared or long-lived vendor credentials, or vendor access that bypasses normal segmentation.
Use the worksheet as an operational sprint when any of the above conditions are present or when a rapid evidence package is required for compliance or incident response.
Definitions
- Vendor access governance audit worksheet: A concise operational tool for inventorying vendor accounts, verifying controls, collecting evidence, assigning remediation ownership, and recording SLAs for closure.
- Vendor account: Any identity, service principal, or credential issued to a third party to access systems, networks, or data.
- Scoped account: A vendor account limited to a narrow set of resources, with time-bound or just-in-time privileges.
- Evidence artifact: Logs, screenshots, exports, or ticket entries that demonstrate access, remediation, or control implementation.
- High risk: Access that allows administrative privileges, full network access, long-lived shared credentials, or access to regulated data.
Common mistakes
- Failing to map accounts to a contract entry. Without a contractual anchor it is hard to enforce controls or escalate non-cooperation.
- Treating guest accounts as low risk. Guest identities can be privileged and often bypass conditional access if not configured correctly.
- Relying solely on vendor statements. Always verify with logs, conditional access policies, and proof of MFA or segmentation.
- Not assigning clear remediation ownership and SLA. Without an owner and deadline items linger and remain exploitable.
Address these by updating procurement workflows, enforcing identity hygiene, and requiring evidence attachments in each worksheet row.
FAQ
How do we prioritize vendors for a first pass?
Prioritize by privilege and potential impact: EMR, backup systems, financial systems, building controls, and any vendor with administrative or network-wide access. Use the worksheet to capture the justification for priority.
What counts as acceptable evidence?
Acceptable evidence includes logs showing last access, screenshots of conditional access or MFA enforcement, ticket entries showing credential rotation, and contract language that requires logging. Preserve timestamps and export raw log snippets where possible.
Can we use this worksheet for procurement decisions?
Yes. Outcomes from recurring audits should feed procurement requirements including logging retention, MFA, segmentation, and termination clauses. Maintain an audit trail to support enforcement at renewal.
What if a remediation breaks vendor functionality?
Use scoped or time-bound access as an interim step. Test changes in a staging environment where possible and document rollback steps. Escalate unresolved functional impacts to the business owner before emergency rollback.