vendor-due-diligence-patrick-munro

Framework for assessing IT service providers, technology vendors, and third-party partners. Creates structured risk assessments across financial, operational, compliance, security, and reputational dimensions with regulatory checklists (GDPR, DORA, NIS2, SOX). Use when: (1) Evaluating new vendors or technology providers, (2) Conducting third-party risk assessments for procurement, (3) Performing critical vendor due diligence for regulatory compliance, (4) Creating vendor onboarding documentation, (5) Establishing ongoing vendor monitoring processes, (6) Assessing vendor concentration risk, or (7) Generating executive-level vendor risk reports.

250 stars

Best use case

vendor-due-diligence-patrick-munro is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Framework for assessing IT service providers, technology vendors, and third-party partners. Creates structured risk assessments across financial, operational, compliance, security, and reputational dimensions with regulatory checklists (GDPR, DORA, NIS2, SOX). Use when: (1) Evaluating new vendors or technology providers, (2) Conducting third-party risk assessments for procurement, (3) Performing critical vendor due diligence for regulatory compliance, (4) Creating vendor onboarding documentation, (5) Establishing ongoing vendor monitoring processes, (6) Assessing vendor concentration risk, or (7) Generating executive-level vendor risk reports.

Teams using vendor-due-diligence-patrick-munro should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/vendor-due-diligence-patrick-munro/SKILL.md --create-dirs "https://raw.githubusercontent.com/lawvable/awesome-legal-skills/main/skills/vendor-due-diligence-patrick-munro/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/vendor-due-diligence-patrick-munro/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How vendor-due-diligence-patrick-munro Compares

Feature / Agentvendor-due-diligence-patrick-munroStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Framework for assessing IT service providers, technology vendors, and third-party partners. Creates structured risk assessments across financial, operational, compliance, security, and reputational dimensions with regulatory checklists (GDPR, DORA, NIS2, SOX). Use when: (1) Evaluating new vendors or technology providers, (2) Conducting third-party risk assessments for procurement, (3) Performing critical vendor due diligence for regulatory compliance, (4) Creating vendor onboarding documentation, (5) Establishing ongoing vendor monitoring processes, (6) Assessing vendor concentration risk, or (7) Generating executive-level vendor risk reports.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# Vendor Due Diligence Framework

## Overview
Comprehensive vendor assessment and due diligence framework for IT service providers, technology vendors, and third-party service providers. Creates structured risk assessments, evaluation reports, and ongoing monitoring frameworks across financial, operational, compliance, security, and reputational dimensions.

## LEGAL DISCLAIMER
**IMPORTANT: This skill provides general information and frameworks for vendor assessment purposes only. It does NOT constitute legal, financial, or professional advice. Users should:**
- Consult qualified legal counsel for specific legal requirements in their jurisdiction
- Engage appropriate financial and security professionals for detailed assessments
- Verify all regulatory requirements independently
- Adapt all frameworks to their specific organizational needs and risk tolerance
- Not rely on this skill as a substitute for professional due diligence services

**The frameworks provided are templates only. Actual vendor assessments require expertise in law, finance, cybersecurity, and risk management. Neither the skill creator nor Claude/Anthropic assumes any liability for decisions made based on this skill's output.**

## When to Use This Skill
Use this skill when you need to:
- Evaluate new vendors, technology providers, or service partners
- Conduct third-party risk assessments for procurement decisions
- Perform critical vendor due diligence for regulatory compliance (DORA, NIS2, GDPR, SOX, etc.)
- Create vendor onboarding documentation and assessment frameworks
- Establish ongoing vendor monitoring and review processes
- Assess vendor concentration risk and business continuity implications
- Generate executive-level vendor risk reports

## Core Capabilities

### 1. Three-Phase Assessment Process
**Phase 1: Initial Screening (Days 1-5)**
- Financial stability assessment (credit ratings, financial statements, market position)
- Basic compliance verification (certifications, licenses, regulatory status)
- Preliminary security posture review (ISO 27001, SOC 2, cyber insurance)
- Reputational check (news screening, litigation history, sanctions lists)
- Business continuity basics (disaster recovery, backup systems)

**Phase 2: Detailed Assessment (Days 5-15)**
- In-depth security evaluation (penetration testing, vulnerability management, incident response)
- Operational deep-dive (SLAs, performance metrics, capacity planning, change management)
- Compliance audit (GDPR, industry-specific regulations, data residency, cross-border transfers)
- Financial analysis (cash flow stability, debt ratios, insurance coverage, bonding capacity)
- Contractual risk review (liability caps, indemnification, IP ownership, termination rights)
- Subcontractor and fourth-party risk assessment

**Phase 3: Final Evaluation & Decision (Days 15-20)**
- Comprehensive risk scoring and rating (1-5 scale across all dimensions)
- Executive summary with recommendation (approve, approve with conditions, reject)
- Risk mitigation plan for identified gaps
- Onboarding roadmap with specific requirements
- Ongoing monitoring framework and KPIs

### 2. Multi-Factor Risk Scoring System
Each vendor receives scores (1=Low Risk to 5=Critical Risk) across:
- **Financial Risk**: Creditworthiness, revenue stability, insurance adequacy, concentration risk
- **Operational Risk**: Service delivery capability, business continuity, dependency/single points of failure
- **Compliance Risk**: Regulatory adherence, audit findings, data protection practices, certification status
- **Security Risk**: Cyber resilience, access controls, incident response, data encryption, vulnerability management
- **Reputational Risk**: Public perception, litigation history, ethical practices, ESG factors
- **Strategic Risk**: Service criticality, exit/transition difficulty, vendor lock-in, innovation capability

**Enhanced Feature**: Weighted risk calculations based on service criticality. Critical services (payment processing, customer data systems) receive 2x weight on security and compliance factors.

### 3. Regulatory Compliance Checklists
Pre-built assessment templates for:
- **GDPR**: Data processing agreements, sub-processor management, cross-border transfers, breach notification
- **DORA (Digital Operational Resilience Act)**: ICT third-party risk management, concentration risk, exit strategies
- **NIS2**: Supply chain security, incident reporting, security measures for essential/important entities
- **SOX**: Internal controls for financial reporting, audit trail requirements
- **PCI DSS**: Payment card data security (if applicable)
- **ISO 27001/SOC 2**: Information security management, control frameworks
- **Industry-specific**: HIPAA (healthcare), FINMA (financial services), FedRAMP (government)

**Enhanced Feature**: Regulatory gap analysis that identifies which requirements the vendor currently fails to meet and severity classification (blocker, major concern, minor gap, acceptable with mitigation).

### 4. Document Request Lists
Comprehensive documentation requirements organized by assessment phase:
- **Financial**: Audited financials (3 years), D&B reports, insurance certificates, bank references
- **Legal/Compliance**: Certifications (ISO, SOC 2), audit reports, privacy policies, DPAs, sub-processor lists
- **Security**: Penetration test results, vulnerability scan reports, incident response plans, disaster recovery documentation
- **Operational**: SLA templates, performance metrics, customer references, org charts, escalation procedures
- **Contractual**: Standard agreements, liability caps, indemnification terms, IP assignment provisions

### 5. Vendor Interview Frameworks
Structured interview guides for:
- **Executive Leadership**: Strategic vision, financial outlook, growth plans, M&A activity
- **Security/IT Teams**: Architecture reviews, access controls, encryption practices, patch management
- **Compliance Officers**: Regulatory adherence, audit processes, remediation tracking
- **Operations Managers**: Service delivery, incident management, change control, capacity planning
- **Legal/Contracts**: Negotiation flexibility, standard terms, liability frameworks

**Enhanced Feature**: Red flag detection prompts - specific questions designed to uncover hidden risks (e.g., "Describe your three most recent security incidents and response," "What percentage of revenue comes from your top 3 clients?")

### 6. Ongoing Monitoring Frameworks
Post-onboarding continuous oversight:
- **Quarterly Reviews**: Performance metrics, security updates, compliance status, financial health
- **Annual Assessments**: Full re-evaluation of risk scores, certification renewals, contract renegotiation
- **Event-Triggered Reviews**: M&A activity, security breaches, regulatory violations, leadership changes, service disruptions
- **KPI Dashboards**: Uptime, response times, security metrics, compliance status, financial indicators

**Enhanced Feature**: Early warning indicators (EWIs) that trigger immediate re-assessment - bankruptcy filings, mass layoffs, major customer losses, data breaches, audit failures, regulatory fines.

## Output Formats

### Vendor Risk Report
Comprehensive assessment report including:
- Executive summary with risk rating and recommendation
- Detailed findings by risk category with evidence
- Risk score matrix (visual heat map)
- Gap analysis against regulatory requirements
- Mitigation recommendations with priority levels
- Onboarding requirements and conditions
- Monitoring and review schedule

### Vendor Comparison Matrix
Side-by-side evaluation of multiple vendors:
- Risk scores across all dimensions
- Compliance coverage comparison
- Cost-benefit analysis
- Strengths/weaknesses summary
- Recommended vendor with justification

### Onboarding Checklist
Structured requirements list:
- Pre-contract deliverables (certifications, insurance, references)
- Contract negotiation priorities (liability, SLAs, termination rights)
- Integration requirements (APIs, data formats, security controls)
- Ongoing obligations (reporting, audit rights, performance reviews)

**Enhanced Feature**: Risk-based onboarding paths - higher risk vendors face stricter requirements (more frequent reviews, additional certifications, enhanced SLAs, stronger termination rights).

## Best Practices

1. **Proportional Assessment**: Scale diligence depth to service criticality and risk exposure
   - Critical/High Risk: Full Phase 1-3 assessment with external expert validation
   - Medium Risk: Phase 1-2 with selective Phase 3 elements
   - Low Risk: Phase 1 with streamlined Phase 2

2. **Document Everything**: Maintain audit trail of assessment decisions, risk acceptances, and mitigation measures

3. **Involve Stakeholders**: Include Legal, IT/Security, Procurement, Business Units, and Compliance in assessment process

4. **Challenge Vendor Claims**: Verify certifications independently, request evidence, conduct site visits for critical vendors

5. **Plan for Exit**: Always assess vendor replaceability, data portability, and transition complexity before signing

6. **Continuous Monitoring**: Due diligence is not one-time - reassess regularly and after triggering events

7. **Concentrate Risk Management**: Track total vendor exposure across organization to identify dangerous concentration

**Enhanced Feature**: Third-party validation recommendations - when to engage external auditors, security firms, or legal counsel for independent verification (critical vendors, regulated services, high-value contracts).

## Risk Mitigation Strategies
Common approaches to address identified gaps:
- **Financial**: Require parent company guarantees, increase insurance requirements, shorten payment terms, implement performance bonds
- **Security**: Mandate specific controls, require penetration testing, implement enhanced monitoring, restrict data access
- **Compliance**: Require certification achievement within timeframe, implement audit rights, add regulatory breach termination clauses
- **Operational**: Define stricter SLAs, require redundancy, implement escrow for critical IP/code, establish backup vendor relationships
- **Strategic**: Limit contract term, build exit provisions, avoid proprietary lock-in, maintain dual-source options

## Limitations and Disclaimers

**This skill does NOT:**
- Replace professional due diligence services (legal, financial, technical audits)
- Provide legal advice on specific contracts or regulatory requirements
- Guarantee vendor performance or eliminate all risks
- Substitute for organization-specific risk frameworks and policies
- Fulfill regulatory obligations without expert validation
- Create attorney-client, fiduciary, or advisory relationships

**Users must:**
- Adapt all frameworks to their specific industry, jurisdiction, and risk tolerance
- Engage qualified professionals for regulated assessments
- Verify all regulatory requirements independently
- Obtain necessary internal approvals before vendor engagement
- Maintain documentation for audit and compliance purposes
- Update assessment criteria as regulations and threats evolve

## Regulatory Context
While this skill references common regulations (GDPR, DORA, NIS2, etc.), users must:
- Verify current regulatory requirements in their jurisdiction
- Consult legal counsel for compliance obligations
- Not rely on this skill for legal interpretation
- Understand that regulatory landscapes change constantly
- Recognize that enforcement varies by regulator and jurisdiction

**Last Updated Framework Version**: January 2025 (Regulatory references may become outdated)

## Example Use Cases

1. **Financial Institution under DORA**: Assessing cloud service provider for critical payment systems
2. **Healthcare Organization**: Evaluating SaaS vendor handling protected health information (HIPAA)
3. **Manufacturing Company**: Third-party risk assessment for industrial control system provider
4. **E-commerce Platform**: Payment processor due diligence under PCI DSS requirements
5. **Government Agency**: FedRAMP compliance assessment for cloud infrastructure provider
6. **Startup**: Rapid vendor screening for limited-risk, non-critical services

---

**FINAL REMINDER**: This is an educational framework and starting point only. Professional due diligence requires expertise in law, finance, cybersecurity, and risk management. Always engage qualified professionals for critical vendor assessments and do not rely solely on this skill for decision-making.

Related Skills

tech-contract-negotiation-patrick-munro

250
from lawvable/awesome-legal-skills

Guide to negotiating technology services agreements, professional services contracts, and commercial B2B transactions. Provides three-position frameworks (provider-favorable, balanced, client-favorable), deal-size tactics, objection handling templates, and concession roadmaps. Use when: (1) Developing negotiation strategies for SaaS, cloud, or managed services agreements, (2) Preparing position papers and fallback positions, (3) Responding to counterparty objections and demands, (4) Creating concession roadmaps that protect critical interests, (5) Assessing tactics based on deal value and leverage, or (6) Structuring balanced outcomes for liability, IP, payment, SLA, or warranty provisions.

red-team-verifier-patrick-munro

250
from lawvable/awesome-legal-skills

Adversarial verification for AI-generated legal content with systematic fact-checking, source validation, and quality control. Use when User requests verification of legal documents, fact-checking of regulatory content, red team review, or quality assurance before distribution to clients/stakeholders. Provides structured verification reports with severity-categorized errors, verified sources, and distribution readiness assessment.

legal-simulation-patrick-munro

250
from lawvable/awesome-legal-skills

Framework for demonstrating AI capabilities in legal contexts. Provides detailed personas across tenant law, business contracts, startup disputes, employment claims, and consumer protection with progressive complexity scenarios. Use when: (1) Demonstrating AI-powered legal triage or intake systems, (2) Showcasing responsible AI-assisted client interactions, (3) Training staff on appropriate AI use in legal contexts, (4) Creating realistic scenarios for legal tech presentations, (5) Developing educational materials about AI in legal services, or (6) Testing AI-powered legal information systems in controlled environments.

xlsx-processing-openai

250
from lawvable/awesome-legal-skills

Toolkit for comprehensive Spreadsheet reading, creation, editing, and analysis with visual quality control. Use to work with spreadsheets (.xlsx, .xlsm, .csv, .tsv) for: (1) Creating new spreadsheets with formulas and formatting, (2) Reading or analyzing tabular data, (3) Modifying existing spreadsheets while preserving formulas, (4) Building financial models with proper formatting, (5) Data visualization with in-sheet charts, or any other spreadsheet tasks.

xlsx-processing-manus

250
from lawvable/awesome-legal-skills

Professional Excel spreadsheet creation with a focus on aesthetics and data analysis. Use when creating spreadsheets for organizing, analyzing, and presenting structured data in a clear and professional format.

xlsx-processing-anthropic

250
from lawvable/awesome-legal-skills

Use this skill any time a spreadsheet file is the primary input or output. This means any task where the user wants to: open, read, edit, or fix an existing .xlsx, .xlsm, .csv, or .tsv file (e.g., adding columns, computing formulas, formatting, charting, cleaning messy data); create a new spreadsheet from scratch or from other data sources; or convert between tabular file formats. Trigger especially when the user references a spreadsheet file by name or path — even casually (like "the xlsx in my downloads") — and wants something done to it or produced from it. Also trigger for cleaning or restructuring messy tabular data files (malformed rows, misplaced headers, junk data) into proper spreadsheets. The deliverable must be a spreadsheet file. Do NOT trigger when the primary deliverable is a Word document, HTML report, standalone Python script, database pipeline, or Google Sheets API integration, even if tabular data is involved.

vscode-extension-builder-lawvable

250
from lawvable/awesome-legal-skills

Build VS Code extensions from scratch or convert existing JS/React/Vue apps. Supports commands, webviews (React/Vue), custom editors, tree views, and AI agent integration via file-bridge IPC. Use when user wants to create a VS Code extension, convert a web app to an extension, add webviews or custom UIs to VS Code, implement tree views, build custom file editors, integrate with AI agents, or package/publish extensions (.vsix).

tabular-review-lawvable

250
from lawvable/awesome-legal-skills

Guide to analyze multiple documents (PDF, DOCX) against user-defined columns and produce a structured Excel output with citations. Use when the user wants to: (1) Extract specific information from multiple documents into a table, (2) Compare clauses or provisions across contracts, (3) Create a document review matrix with source citations. Triggers on: 'tabular review', 'document matrix', 'extract from documents', 'compare across documents', 'review multiple contracts'.

statute-analysis-rafal-fryc

250
from lawvable/awesome-legal-skills

Guide for reading, interpreting, and applying statutes, regulations, and rules in legal and compliance contexts. Use when the user asks about (1) how to read and interpret statutes, regulations, or rules, (2) statutory interpretation methods and canons of construction, (3) understanding legislative intent, (4) applying statutes to specific legal situations, (5) extracting requirements from legal text, (6) distinguishing between different types of legal requirements, or (7) cross-jurisdictional compliance analysis.

skill-optimizer-lawvable

250
from lawvable/awesome-legal-skills

Guide to analyze a current work session and propose improvements to skills. Use (1) automatically after working with a skill to capture learnings, (2) when the user suggests improvements, corrections, or additions during a skill-related session, or (3) when the user manually invokes `self-improve`.

skill-creator-openai

250
from lawvable/awesome-legal-skills

Guide for creating effective skills. Use when users want to create a new skill (or update an existing skill) that extends the model's capabilities with specialized knowledge, workflows, or tool integrations.

skill-creator-anthropic

250
from lawvable/awesome-legal-skills

Guide for creating effective skills. This skill should be used when users want to create a new skill (or update an existing skill) that extends Claude's capabilities with specialized knowledge, workflows, or tool integrations.