What is Shared Assessments SIG
The Shared Assessments SIG (Standardized Information Gathering) questionnaire is a comprehensive vendor security assessment tool containing 18 control domains and over 1,000 questions aligned to ISO 27001, NIST, and other frameworks. SIG standardizes third-party risk assessments by providing control mapping to regulatory requirements like SOC 2, GDPR, and HIPAA, reducing duplicate requests and audit fatigue across vendor populations.
Key takeaways:
- Industry-standard questionnaire with 1,000+ controls across 18 security domains
- Maps directly to ISO 27001, NIST CSF, SOC 2, and 40+ regulatory frameworks
- Available in Core, Lite, and AUP versions for different vendor risk tiers
- Reduces assessment redundancy by 40-most through standardized format
- Accepted by 15,000+ organizations globally for vendor due diligence
Vendor security assessments consume 120+ hours annually per organization, with enterprises managing 500-1,000 vendor relationships on average. The Shared Assessments SIG questionnaire emerged in 2005 as the financial services industry's answer to assessment sprawl—where vendors received dozens of similar but slightly different security questionnaires from each customer.
SIG provides a unified assessment methodology that satisfies multiple regulatory requirements through a single questionnaire. Rather than completing separate assessments for SOC 2, ISO 27001, NIST, and customer-specific requirements, vendors complete one SIG assessment that maps to all major frameworks.
For GRC analysts performing vendor due diligence, SIG serves as both an assessment tool and a framework crosswalk. The questionnaire's control mapping enables direct traceability from vendor responses to specific regulatory requirements, creating defensible audit trails for examiner review.
SIG Structure and Components
The SIG questionnaire operates on a maturity-based scoring system across 18 control domains:
| Domain | Control Count | Primary Framework Alignment |
|---|---|---|
| A. Cybersecurity | 89 controls | NIST CSF, ISO 27001 |
| B. Physical Security | 52 controls | ISO 27001, FISMA |
| C. Business Continuity | 48 controls | ISO 22301, FFIEC |
| D. Human Resources | 41 controls | ISO 27001, SOC 2 |
| E. Legal & Compliance | 37 controls | GDPR, CCPA, HIPAA |
| F. Risk Management | 63 controls | COSO, ISO 31000 |
Each control includes:
- Maturity level indicators (0-5 scale)
- Implementation evidence requirements
- Compensating control options
- Framework mapping references
Regulatory Crosswalk Functionality
SIG's framework crosswalk maps individual controls to 40+ regulatory standards:
Financial Services: FFIEC IT Examination Handbook, OCC Bulletin 2013-29, Federal Reserve SR 13-19, PCI DSS v4.0
Healthcare: HIPAA Security Rule (45 CFR §164.308-316), HITRUST CSF v11.2, FDA 21 CFR Part 11
Privacy: GDPR Articles 32-34, CCPA §1798.150, PIPEDA Schedule 1, LGPD Chapter VII
Technology: SOC 2 Trust Services Criteria, ISO/IEC 27001:2022, NIST SP 800-53 Rev 5, CSA CCM v4.0
Control mapping enables single assessment reuse. A vendor completing SIG for one customer can provide the same assessment to satisfy another customer's ISO 27001 requirements, as SIG control F.2.1 maps directly to ISO 27001 A.5.1.1 (Information Security Policies).
SIG Versions and Risk Tiering
SIG Core
Full 1,000+ question assessment for critical vendors handling sensitive data. Required completion time: 40-60 hours. Use cases:
- Cloud infrastructure providers
- Payment processors
- PHI/PII data processors
- Critical business process outsourcing
SIG Lite
Abbreviated 250-question subset for moderate-risk vendors. Completion time: 8-12 hours. Use cases:
- Professional services firms
- Non-critical SaaS applications
- Vendors with limited data access
- Annual spend under $1M
AUP (Agreed Upon Procedures)
Validation methodology where independent auditors verify SIG responses. Provides attestation-level assurance without full SOC 2 audit expense. Typical cost: $15,000-25,000 vs $50,000+ for SOC 2.
Implementation in Vendor Risk Programs
Initial Assessment Workflow
- Risk tier vendor based on data classification and criticality
- Select appropriate SIG version (Core/Lite)
- Include SIG requirement in RFP/contract language
- Set completion deadline (typically 30-45 days)
- Review responses against internal control requirements
- Map deficiencies to compensating controls
- Generate risk scoring using weighted domain scores
Ongoing Monitoring
Annual reassessment cycles align with SOC 2 and ISO 27001 requirements. Changes triggering reassessment:
- Material control environment changes
- Breach or incident occurrence
- Subservice provider changes
- Geographic expansion affecting data residency
Common Implementation Challenges
Version Control: SIG updates annually. Vendors may submit v6.0 responses when customers require v7.0. Solution: Accept prior version with supplemental questions for new controls.
Scoring Standardization: Organizations apply different weights to domain scores. A financial services firm weights Domain P (Privacy) at a notable share of while healthcare organizations weight at 40%.
Evidence Collection: SIG identifies required evidence but doesn't mandate format. Vendors provide policies as 200-page PDFs rather than specific control excerpts, requiring 4-6 hours additional review time per assessment.
Industry-Specific Considerations
Financial Services: Federal Reserve guidance (SR 13-19) specifically recognizes "standardized assessments" for vendor management. SIG satisfies FFIEC Appendix J requirements for outsourced services.
Healthcare: HIPAA Omnibus Rule requires business associate agreements backed by security assessments. SIG Domain N (Network Security) maps to HIPAA §164.312 technical safeguards.
Government Contractors: FedRAMP Moderate baseline aligns with SIG Core for cloud services. Agencies accept SIG as initial assessment before formal ATO process.
ROI and Efficiency Metrics
Organizations report:
- 40-a large share of reduction in assessment time through SIG standardization
- most decrease in vendor questionnaire fatigue
- $150,000 annual savings from consolidated assessments (enterprise with 500+ vendors)
- 30-day average reduction in vendor onboarding time
Vendors benefit through:
- Single assessment satisfying multiple customers
- Reduced sales cycle delays from security reviews
- Competitive differentiation via AUP validation
- the majority of reduction in custom questionnaire completion
Frequently Asked Questions
How does SIG differ from SOC 2 or ISO 27001 certification?
SIG is a self-assessment questionnaire, while SOC 2 and ISO 27001 require independent auditor validation. SIG responses map to these frameworks but don't provide third-party attestation.
Can vendors refuse to complete SIG assessments?
Yes, but many RFPs now require SIG completion for consideration. Alternative assessments must demonstrate equivalent control coverage across all 18 domains.
How often should vendors update their SIG responses?
Annually at minimum, or within 30 days of material control changes. AUP-validated SIGs require annual revalidation to maintain currency.
What's the difference between SIG and CAIQ (Consensus Assessment Initiative Questionnaire)?
CAIQ focuses on cloud security controls (200 questions) while SIG covers broader operational risk (1,000+ questions). CAIQ maps to CSA Cloud Controls Matrix; SIG maps to 40+ frameworks.
Do SIG assessments satisfy regulatory examination requirements?
Regulators accept SIG as evidence of vendor due diligence but may request additional documentation. FFIEC, OCC, and Federal Reserve examiners regularly review SIG assessments during IT examinations.
How much does SIG licensing cost?
Shared Assessments membership starts at $7,500 annually, including SIG access and framework updates. Non-members can purchase individual assessments for $2,500 each.
Can small vendors complete SIG Lite instead of Core?
Risk tier determines version, not vendor size. A 10-person firm processing credit cards requires SIG Core; a 1,000-person consulting firm without sensitive data access may use SIG Lite.
Frequently Asked Questions
How does SIG differ from SOC 2 or ISO 27001 certification?
SIG is a self-assessment questionnaire, while SOC 2 and ISO 27001 require independent auditor validation. SIG responses map to these frameworks but don't provide third-party attestation.
Can vendors refuse to complete SIG assessments?
Yes, but many RFPs now require SIG completion for consideration. Alternative assessments must demonstrate equivalent control coverage across all 18 domains.
How often should vendors update their SIG responses?
Annually at minimum, or within 30 days of material control changes. AUP-validated SIGs require annual revalidation to maintain currency.
What's the difference between SIG and CAIQ (Consensus Assessment Initiative Questionnaire)?
CAIQ focuses on cloud security controls (200 questions) while SIG covers broader operational risk (1,000+ questions). CAIQ maps to CSA Cloud Controls Matrix; SIG maps to 40+ frameworks.
Do SIG assessments satisfy regulatory examination requirements?
Regulators accept SIG as evidence of vendor due diligence but may request additional documentation. FFIEC, OCC, and Federal Reserve examiners regularly review SIG assessments during IT examinations.
How much does SIG licensing cost?
Shared Assessments membership starts at $7,500 annually, including SIG access and framework updates. Non-members can purchase individual assessments for $2,500 each.
Can small vendors complete SIG Lite instead of Core?
Risk tier determines version, not vendor size. A 10-person firm processing credit cards requires SIG Core; a 1,000-person consulting firm without sensitive data access may use SIG Lite.
Put this knowledge to work
Daydream operationalizes compliance concepts into automated third-party risk workflows.
See the Platform