Here's a scenario we've watched play out dozens of times: A B2B SaaS company is seven months into a six-figure contract negotiation with a Fortune 500 prospect. The deal is essentially closed — pricing agreed, champion identified, executive sponsor aligned. Then the prospect's security team sends a 247-question vendor assessment questionnaire. The startup can't answer 40% of the questions satisfactorily. The deal stalls for nine months. By the time the gaps are addressed, the budget has been reallocated.
This isn't an edge case. More than 75% of Fortune 500 companies request SOC 2 reports before working with a new vendor. Among companies with 5,000+ employees, 83-91% require SOC 2 certification before signing contracts. And 61% of enterprise buyers now require InfoSec sign-off before purchase — not after.
We've spent two decades on the buyer side of this equation — evaluating vendors, writing security requirements, and making the go/no-go decisions that determine whether your product gets into a Fortune 500 environment. Here's what we actually look for.
The Seven Requirements That Matter Most
1. Identity and Access Management
This is where most vendor evaluations start, and where a surprising number end. According to Gartner's CISO priorities survey, User Access, IAM, and Zero Trust became the number one CISO priority in 2024 for the first time, displacing Cloud Security.
What we require:
- SAML 2.0 or OIDC single sign-on — Integration with enterprise identity providers (Okta, Microsoft Entra ID, Ping). Requiring employees to manage separate SaaS credentials is a security and operational failure. If your product doesn't support SSO, the evaluation ends here.
- SCIM provisioning — System for Cross-domain Identity Management automates user provisioning and deprovisioning. Without SCIM, enterprise IT cannot reliably remove access when an employee leaves. This is a major audit finding.
- Granular RBAC — Role-based access control with least-privilege enforcement. Admin-or-nothing access models are not acceptable. We need to assign users minimum required permissions.
- MFA enforcement — Your product must support and ideally require multi-factor authentication. The absence of MFA support is an immediate disqualifier.
If you're putting SSO, SCIM, or audit logs behind your highest pricing tier, enterprise procurement has a term for this: "SOC 2 tax." It's increasingly a deal-breaker.
2. Encryption Standards
Enterprise security teams will verify specific technical implementations, not just check a "yes, we encrypt" box:
- Data in transit: TLS 1.2 minimum, TLS 1.3 preferred. TLS 1.0 and 1.1 must be disabled. Perfect Forward Secrecy (PFS) required. No weak cipher suites (RC4, 3DES, export-grade).
- Data at rest: AES-256 for all data stores, including backups. Transparent Data Encryption is table stakes — field-level encryption for PII/PHI is increasingly expected.
- Key management: FIPS 140-2 validated HSM preferred. Documented key rotation schedule. Customer-managed keys (BYOK) for the highest sensitivity tiers.
- Certificate management: Valid certificates, no SHA-1, proper chain of trust, automation to prevent expiry.
3. Data Residency and Sovereignty
Where data is stored, processed, and backed up is non-negotiable for regulated industries. We need exact answers, not vague assurances:
- Specific AWS regions, Azure regions, or GCP zones where data resides
- Whether data can be restricted to specific geographies (US-only, EU-only)
- Complete subprocessor list with geographic locations
- DR/backup locations — because data sovereignty requirements apply to backups too
The ability to guarantee "EU data stays in EU" is a hard requirement for any vendor processing European data subjects. This isn't a nice-to-have — it's a legal obligation under GDPR.
4. Audit Logging and Monitoring
Enterprise security teams need to integrate vendor activity data into their SIEM and security monitoring stack. This requires:
- Comprehensive audit logs covering all user actions, admin changes, data access, and configuration modifications
- Log export capability via API, SIEM integration, or webhook
- Minimum 12-month log retention (many enterprises require 18-24 months)
- Tamper-evident or immutable log storage
5. Incident Response and Breach Notification
We evaluate how a vendor will handle a security incident — because incidents will happen. Specific expectations:
- Documented incident response plan with defined severity levels
- Contractual breach notification timelines (72 hours maximum for GDPR-relevant incidents; many enterprises require 24-48 hours)
- Named security contact — not a generic support email
- Post-incident reporting commitment including root cause analysis
6. Vulnerability Management and Penetration Testing
We ask for evidence, not promises:
- Current-year penetration test executive summary (dated, from a reputable firm)
- Vulnerability management program with defined SLAs for remediation by severity
- Secure SDLC documentation — how security is integrated into the development lifecycle
- Bug bounty or responsible disclosure program
7. Compliance Certifications
Certifications signal that a third party has validated your security controls. The standard expectations:
- SOC 2 Type II — This is the baseline. Type I (point-in-time) is acceptable for startups in their first year of compliance, but Type II (observation period) is the standard for enterprise relationships.
- ISO 27001 — Particularly valued by European and global enterprises. The scope statement matters — certification scoped to a single office doesn't help if the product is hosted elsewhere.
- Industry-specific: HIPAA (healthcare), PCI DSS (payments), FedRAMP (government), HITRUST (healthcare/multi-framework)
The Assessment Process: What Actually Happens
Enterprise vendor security assessments typically follow a tiered approach based on data sensitivity and business criticality:
- Low-risk vendors: CAIQ Lite (71 questions) or abbreviated SIG questionnaire, plus SOC 2 review
- Medium-risk vendors: Full SIG Core (approximately 800 questions) or CAIQ Full (261 questions), SOC 2 Type II review, architecture review
- High-risk/critical vendors: Everything above, plus on-site assessment, penetration test review, incident response tabletop, and ongoing monitoring requirements
The Shared Assessments SIG questionnaire is the most common framework we see in Fortune 500 environments. It covers 19 risk domains with approximately 800 questions in the full version. The CSA Consensus Assessments Initiative Questionnaire (CAIQ) is standard for cloud-specific vendors.
The Seven Gaps That Kill Deals
After evaluating hundreds of vendors, the same gaps cause the same outcomes. Here are the seven issues that most frequently stall or kill enterprise deals:
- No SOC 2 Type II report — Full stop for 75%+ of Fortune 500 buyers
- No SSO or SCIM support — Forces manual user management and creates deprovisioning risk
- No audit log export — Enterprise security teams can't monitor what they can't see
- Vague or missing data residency documentation — "AWS US East" isn't specific enough. Exact regions, subprocessors, and backup locations are required.
- No penetration test evidence — A current-year pen test summary from a reputable firm is expected, not optional
- Admin-only access model — No RBAC means no least-privilege, which means audit findings
- Security features gated behind premium tiers — SSO, SCIM, audit logs, and MFA should not be upsell features
When a security questionnaire reveals multiple gaps, deals are delayed 3-6 months per gap cluster. Six gaps typically means deal death or a 9+ month stall as stakeholder priorities shift and budgets get reallocated.
The Trust Center Package
Enterprise procurement expects a standard set of documentation available on request (typically under NDA). If you're building a vendor security program from scratch, this is your target state:
- SOC 2 Type II report (gated under NDA)
- ISO 27001 certificate with scope statement
- Penetration test executive summary (current year, dated)
- Data Processing Agreement (DPA) template
- Subprocessor list with data locations
- Incident Response Plan summary
- Data residency and storage location documentation
- Security policies summary (access control, encryption, change management)
Having this package ready before the security questionnaire arrives reduces assessment timelines from months to weeks.
What Actually Impresses Us
Beyond meeting baseline requirements, certain approaches signal genuine security maturity:
- Proactive security documentation — A public trust center with architecture diagrams, compliance certifications, and security whitepapers, available without a sales call
- Transparent incident history — Vendors who disclose and explain past incidents demonstrate maturity. Vendors who claim zero incidents raise more questions than they answer.
- Security in the product roadmap — Evidence that security features are planned alongside product features, not bolted on after a deal is at risk
- Customer-managed encryption keys — Offering BYOK demonstrates both technical capability and an understanding of enterprise requirements
- Rapid questionnaire response — Having answers pre-built for the major frameworks (SIG, CAIQ, custom) signals that enterprise sales is not an afterthought
The Bottom Line for Vendors
52% of enterprise buyers choose vendors based on certifications and data privacy posture. 57% have replaced a SaaS provider specifically because of unresolved security issues. The security review isn't a hurdle to clear — it's a competitive differentiator. Vendors who invest in security early close enterprise deals faster, command higher contract values, and retain customers longer.
If you're a SaaS vendor planning to sell into the enterprise, the time to build your security program is before the first security questionnaire arrives — not after.
Need help preparing for enterprise security reviews?
We help SaaS vendors build security programs that pass Fortune 500 scrutiny. From SOC 2 readiness to questionnaire response, we bring the buyer's perspective to your preparation.