Free, professional-grade templates for TPRM, VRMS, VAPT, GRC, Incident Response, Zero Trust and more — built by MudraTech security experts.
5 templates
Comprehensive security questionnaire to assess the risk posture of third-party vendors before onboarding.
Step-by-step checklist to ensure every new vendor meets your organization's security baseline before access is granted.
Identify and assess the security risk of your vendors' vendors — the hidden risk in your supply chain.
Formal Third Party Risk Management policy template aligned with ISO 27001, SOC 2, and NIST frameworks.
Ensure all data, access, and credentials are properly revoked and returned when ending a vendor relationship.
4 templates
Standardized matrix to score and tier vendors by risk level based on data sensitivity, access, and criticality.
Comprehensive due diligence template covering financial, legal, operational, and security aspects of vendors.
One-page security scorecard to track and communicate vendor security posture across key control domains.
Structured annual review template to reassess vendor security posture, remediation progress, and contract alignment.
2 templates
Detailed security assessment template to evaluate a third party's technical and administrative security controls.
Standardized Information Gathering (SIG) Lite questionnaire template for efficient third-party security assessments.
5 templates
Complete SOC 2 Type II readiness checklist covering all 5 Trust Service Criteria to prepare for your audit.
Assess your current security posture against all ISO 27001:2022 Annex A controls and identify gaps to close before certification.
Data Protection Impact Assessment template to evaluate and document data processing activities under GDPR Article 35.
Comprehensive Information Security Policy template aligned with ISO 27001, NIST, and CIS frameworks.
PCI DSS v4.0 Self-Assessment Questionnaire template for merchants and service providers handling cardholder data.
3 templates
Professional Vulnerability Assessment and Penetration Testing (VAPT) report template with findings, CVSS scores, and remediation guidance.
OWASP-aligned checklist for developers and security engineers to identify security vulnerabilities during code review.
Assessment template based on OWASP API Security Top 10 to evaluate and harden REST, GraphQL, and SOAP APIs.
3 templates
Complete Incident Response Plan (IRP) template covering preparation, detection, containment, eradication, recovery, and lessons learned.
Regulatory-compliant data breach notification templates for GDPR, IT Act (India), and CERT-In reporting requirements.
Structured incident report template for documenting security incidents from initial detection to post-incident review.
2 templates
Standardized Change Request (CR) template for managing IT changes through a formal CAB approval process.
Service Level Agreement (SLA) definition and monitoring template for IT services, with KPI tracking and breach alerting.
2 templates
Step-by-step checklist to implement Zero Trust Architecture (ZTA) based on NIST SP 800-207 principles.
Periodic access review template to certify user entitlements, remove excessive privileges, and enforce least-privilege access.
Stop filling templates manually. AEGISOne automates vendor assessments, tracks responses, scores risks, and generates reports — all in one platform.
Start 7-Day Free TrialNo credit card · Full access · Cancel anytime