SaaSFort
SIG questionnaire vendor risk assessment third party risk management SaaS security Shared Assessments

SIG Questionnaire for SaaS Vendors: The Complete Response Guide

Master the Shared Assessments SIG questionnaire. Covers SIG Core vs SIG Lite, all 19 risk domains, response strategies by domain, common pitfalls, and how to automate evidence gathering for faster SaaS vendor assessments.

SaaSFort Team ·

Why Enterprise Buyers Send SIG Questionnaires

When an enterprise procurement team evaluates your SaaS product, the Standardized Information Gathering (SIG) questionnaire from Shared Assessments is one of the most common assessments you’ll face. Unlike ad-hoc security questionnaires, the SIG follows a structured format with standardized risk domains — making it both predictable and demanding.

The SIG serves two purposes for buyers:

  • Risk classification — Categorize your product’s risk level before onboarding
  • Due diligence documentation — Create an auditable record of vendor security posture

For SaaS vendors selling into financial services, healthcare, or Fortune 500 companies, receiving a SIG is not a question of “if” but “when.”

SIG Core vs SIG Lite: Which One Will You Receive?

The Shared Assessments program offers two primary questionnaire versions. Understanding the difference shapes your preparation strategy.

FeatureSIG LiteSIG Core
Questions~126~855
Risk domains19 (high-level)19 (detailed)
Typical useLow-to-medium risk vendorsHigh-risk / data-sensitive vendors
Time to complete2–5 days2–4 weeks
When you’ll see itInitial screening, non-sensitive data accessFull onboarding, PII/financial data access
Evidence requiredPolicies and attestationsPolicies, procedures, technical evidence, screenshots

SaaSFort Tip: If a buyer sends you SIG Lite, treat it as a gateway. A strong Lite response can prevent escalation to SIG Core — saving you weeks of effort.

When Buyers Escalate to SIG Core

Escalation triggers include:

  • Your product handles PII, PHI, or financial data
  • You integrate with the buyer’s internal systems (SSO, APIs, data feeds)
  • Your initial SIG Lite responses reveal gaps or inconsistencies
  • Regulatory requirements mandate comprehensive assessment (PCI DSS, HIPAA, SOX)

The 19 SIG Risk Domains — What Each Covers

Every SIG questionnaire — Lite or Core — is organized around 19 risk domains. Here’s what each one examines and where SaaS vendors commonly struggle.

Domain-by-Domain Breakdown

#DomainWhat It CoversCommon SaaS Gaps
1Enterprise Risk ManagementRisk governance, risk appetite, board oversightNo documented risk register
2Security PolicyWritten security policies, review cadencePolicies exist but haven’t been reviewed in 12+ months
3Organizational SecuritySecurity team structure, CISO/DPO roleNo dedicated security role below 100 employees
4Asset ManagementAsset inventory, classification, ownershipShadow IT, untracked cloud services
5Human Resources SecurityBackground checks, security training, terminationNo annual security awareness training
6Physical & EnvironmentalData center security, environmental controlsRelying on cloud provider (AWS/GCP) without documenting shared responsibility
7IT Operations ManagementChange management, capacity, loggingNo formal change management process
8Access ControlIAM policies, MFA, privileged access managementNo MFA on admin accounts, shared credentials
9Application SecuritySDLC, code review, vulnerability managementNo documented SDLC, no regular pen testing
10Cybersecurity Incident ManagementIR plan, notification procedures, tabletop exercisesIR plan exists but never tested
11Operational ResilienceBCP/DR plans, RTO/RPO, backup testingRTO/RPO undefined, backups not tested
12Compliance & LegalRegulatory mapping, audit history, certificationsNo SOC2 or ISO 27001, no regulatory mapping
13End User Device ManagementEndpoint security, MDM, BYOD policyNo MDM solution, BYOD without controls
14Network SecuritySegmentation, firewall rules, IDS/IPSFlat network architecture
15PrivacyGDPR/CCPA compliance, DPA, data processing recordsNo ROPA (Record of Processing Activities)
16Threat ManagementThreat intelligence, vulnerability scanningNo continuous scanning program
17Server SecurityHardening standards, patching cadenceNo documented hardening baseline
18Cloud Hosting & Shared ResponsibilityCSP agreements, shared responsibility documentationCannot articulate shared responsibility model
19Supply Chain Risk ManagementFourth-party risk, subprocessor inventoryNo subprocessor inventory or notification process

5-Step Response Strategy

Step 1: Triage and Scope

Before answering a single question:

  • Identify which version you received (Lite vs Core)
  • Map which domains are marked as “in scope” — buyers often exclude irrelevant domains
  • Note the deadline and contact for clarification questions
  • Check if the buyer accepts references to existing certifications (SOC2 report, ISO 27001 certificate) instead of full answers

Step 2: Gather Your Evidence Library

Build a reusable evidence library that maps to SIG domains:

  • Policies — Information security policy, acceptable use, data classification, incident response
  • Technical evidence — Scan reports, pen test summaries, architecture diagrams
  • Certifications — SOC2 Type II report, ISO 27001 certificate, privacy certifications
  • Process documentation — SDLC description, change management process, BCP/DR plans
  • Compliance records — GDPR ROPA, DPA template, subprocessor list

SaaSFort Tip: A well-organized evidence library can cut SIG completion time by 60%. Store everything in a shared drive with consistent naming: [Domain#]-[DocumentType]-[Date].pdf

Step 3: Answer with the STAR Format

For each SIG question, structure your response using STAR:

  • Situation — Acknowledge the risk area
  • Task — State your policy or control objective
  • Action — Describe what you specifically do
  • Result — Provide evidence or metrics

Example for Domain 8 (Access Control):

“All production systems require MFA via Okta SSO. Privileged access follows just-in-time provisioning with 4-hour expiry. Access reviews are conducted quarterly — last review completed January 2026 with 100% coverage. Evidence: Okta access report, quarterly review log.”

Step 4: Address Gaps Honestly

Every SaaS vendor has gaps. How you handle them determines whether the buyer proceeds or walks away.

Gap ResponseBuyer Reaction
Ignore the question or leave blankImmediate red flag — often deal-ending
Answer “N/A” without explanationSuggests you don’t understand the risk
Acknowledge gap + provide remediation timelineProfessional, shows maturity
Acknowledge gap + show compensating controlStrong — demonstrates risk awareness

Template for gap responses:

“[Control] is not currently implemented. Compensating control: [alternative measure]. Remediation plan: [specific action] by [date]. Risk owner: [name/role].”

Step 5: Internal Review Before Submission

Before sending your SIG response:

  • Cross-check answers against your SOC2/ISO 27001 report (if you have one) for consistency
  • Have a second person review for accuracy and completeness
  • Verify all referenced evidence documents are attached or accessible
  • Check that dates, versions, and names are current (not from last year’s response)
  • Ensure gap responses include remediation timelines

SIG vs Other Security Questionnaires

SaaS vendors often receive multiple questionnaire formats. Here’s how SIG compares:

QuestionnaireOwnerQuestionsFocusBest For
SIG CoreShared Assessments~855Comprehensive riskFinancial services, high-risk vendors
SIG LiteShared Assessments~126High-level screeningInitial assessments, low-risk vendors
CAIQ v4Cloud Security Alliance~260Cloud-specific controlsCloud/SaaS vendors, CSA STAR
HECVATEDUCAUSE~200Higher educationEdTech vendors
VSA/VRAQVarious50–300Custom buyer requirementsAd-hoc enterprise assessments
DDQCustomVariesDue diligence (M&A, partnerships)Investment and partnership evaluation

Key insight: A strong SIG response library gives you 70–80% coverage for most other security questionnaires. The SIG’s 19 domains map cleanly to ISO 27001 Annex A, NIST CSF, and SOC2 Trust Services Criteria.

Common Mistakes That Kill SIG Responses

1. Copy-Pasting Generic Answers

Enterprise buyers review hundreds of SIG responses. They recognize generic, templated answers immediately. Tailor each response to your actual environment.

2. Confusing “We Plan To” with “We Do”

SIG questions ask about current state. If you don’t have a control in place, don’t describe it as if you do. Use the gap response template above instead.

3. Ignoring the Shared Responsibility Model

For Domain 18 (Cloud Hosting), many SaaS vendors answer “AWS handles that” without documenting their side of shared responsibility. Buyers need to see that you understand what AWS manages vs what you manage.

4. Not Versioning Your Responses

When a buyer renews their assessment next year, they’ll compare your new SIG response against last year’s. Inconsistencies erode trust. Version your responses and track changes.

5. Treating SIG as a One-Time Exercise

The most successful SaaS vendors maintain a living SIG response document that gets updated quarterly — not rebuilt from scratch every time a buyer asks.

Automating SIG Evidence with SaaSFort

Manual SIG completion is a time sink. Here’s how SaaSFort accelerates the process:

SIG DomainManual ApproachSaaSFort Approach
Application Security (D9)Run one-off pen test, wait 4–8 weeksContinuous OWASP scanning, always-current report
Threat Management (D16)Hire external scanner annuallyAutomated vulnerability scanning across 13 categories
Network Security (D14)Manual firewall reviewSSL/TLS, DNS security, header analysis on every scan
Cloud Hosting (D18)Write shared responsibility narrativeAuto-generated security posture report with evidence
Cybersecurity Incident (D10)Reference outdated pen testDeal Report with current findings and remediation status

With SaaSFort, Domains 9, 14, 16, and 18 are covered by continuous scanning data. Your Deal Report serves as always-current evidence that can be attached directly to your SIG response.

From Weeks to Hours

A typical SIG completion timeline:

  • Without automation: 2–4 weeks (SIG Core), 2–5 days (SIG Lite)
  • With SaaSFort + evidence library: 3–5 days (SIG Core), 4–8 hours (SIG Lite)

30-Day SIG Readiness Plan

WeekActions
Week 1Inventory existing policies and documentation. Run initial SaaSFort scan to establish security baseline. Identify which of the 19 domains you can answer today.
Week 2Draft missing policies (IR plan, access control, data classification). Set up continuous scanning schedule. Create evidence library folder structure.
Week 3Complete gap analysis across all 19 domains. Write gap responses with remediation timelines. Conduct internal tabletop exercise for incident response.
Week 4Build reusable SIG Lite response template. Pre-populate answers for all 19 domains. Conduct dry-run review with a colleague acting as the buyer.

Key Takeaways

  • The SIG questionnaire covers 19 risk domains — prepare evidence for each before a buyer asks
  • SIG Lite (~126 questions) is your gateway; a strong response prevents escalation to SIG Core (~855 questions)
  • Build a reusable evidence library that cuts completion time by 60%
  • Address gaps honestly with compensating controls and remediation timelines
  • Automate application security evidence with continuous scanning to keep Domains 9, 14, 16, and 18 always current
  • A single well-maintained SIG response covers 70–80% of other security questionnaires

Your SIG response is not just compliance paperwork — it’s a sales tool. A fast, thorough, and honest response demonstrates security maturity that enterprise buyers reward with faster procurement cycles and larger contracts.

Von der Theorie zur Praxis

Scannen Sie Ihre Domain kostenlos. Erste Ergebnisse in unter einer Stunde.

Kostenlosen Scan starten