Thursday, April 9, 2026

The Security Questionnaire Is Theater. Both Sides Know It.

Kash Sajadi

Every quarter, someone on your security team gets a spreadsheet.

It has 200 rows. Column A is a question. Column B is where you’re supposed to type your answer. The questions cover encryption at rest, access controls, incident response procedures, subprocessor lists, penetration testing cadence, and about 180 other things that collectively describe whether your organization is serious about security.

You know what happens next.

Someone finds last quarter’s version in a shared drive. They open it, update three answers that have changed, swap in the new pen test date, and send it back. The whole process takes 45 minutes. The spreadsheet goes into the vendor’s shared drive. Nobody reads it. Six months later you do it again.

This is the security questionnaire. And both sides of this exchange know it isn’t working.

Why the Questionnaire Became Checkbox Theater

The vendor security questionnaire started as a reasonable idea. Before you share sensitive data with a third party, you want to know something about how they handle it. You want to understand their security posture. You want to make an informed decision about whether the risk is acceptable.

The problem is that the mechanism for doing this — a long spreadsheet of yes/no questions — was never well-suited to the task.

Questions like “Do you encrypt data at rest?” tell you almost nothing useful. Every vendor answers yes. The question isn’t whether encryption exists, it’s how it’s implemented, who holds the keys, what the exception process looks like, and whether the policy matches the reality. A checkbox can’t surface any of that.

So questionnaires got longer. More specific. More technical. And as they got longer, the people filling them out got further removed from the people who actually knew the answers. A compliance coordinator started maintaining a “standard responses” document. The document became the questionnaire response process. The process became indistinguishable from a mail merge.

Now you have a 200-question document that took 45 minutes to complete and tells the recipient approximately nothing they couldn’t have assumed.

The Receiving End Is Just As Broken

Here’s where it gets symmetrical: the people requesting questionnaires aren’t really reading them either.

A vendor questionnaire comes in. It routes to whoever handles vendor risk — maybe a dedicated team, maybe a security engineer with twenty other things on their plate, maybe a shared inbox that gets checked when someone remembers to. Someone opens the spreadsheet, scans for red flags, finds none, marks it reviewed, and files it.

The review took twelve minutes. The document was 47 pages long.

Nobody is lying here. Nobody is acting in bad faith. The incentive structure just doesn’t support deep engagement. The questionnaire exists to create a paper trail showing due diligence was performed. Not to actually surface risk. Not to make a better vendor decision. To demonstrate, if anyone later asks, that a process was followed.

This is what checkbox compliance looks like at scale. Both sides play the game because the game is what’s expected. The output is a filing cabinet full of spreadsheets that have never informed a single security decision.

The Process Gap Nobody Fixes

The questionnaire problem isn’t really about the questions. It’s about what happens to a questionnaire when it arrives.

On the receiving side: it lands in an inbox. Someone figures out it’s a questionnaire — maybe obvious, maybe not, if it came with a cover email about “completing your vendor assessment.” They try to figure out who should fill it out. Some questions are clearly infosec. Some are legal. Some are about infrastructure that only one specific engineer understands. The questionnaire gets forwarded around. Sections get filled out by different people in different docs. Someone assembles the final version. It takes three weeks.

Three weeks, for a document that the recipient will read for twelve minutes.

On the sending side: the completed questionnaire comes back and has to go somewhere. Someone needs to review it. Flag concerns. Escalate anything that needs a conversation. Record the outcome. Most organizations have a rough sense that this happens, and a weak system for making sure it does.

The result: the questionnaire is a high-effort, low-signal process that generates paperwork without generating insight.

What a High-Signal Exchange Actually Looks Like

The questionnaire itself isn’t the enemy. The problem is the process void around it.

A security questionnaire, handled well, should work like this:

The questionnaire arrives and is automatically recognized as a questionnaire — not mistaken for a general inquiry, not sitting in a shared inbox waiting for someone to manually triage it. It’s classified on arrival and immediately routed to the right people.

The right people are defined in advance. Not “whoever sees it.” A named team, with sections automatically distributed to the relevant owners — infosec handles the technical controls, legal handles the data processing questions, infrastructure owns the availability and resilience section. Parallel, not sequential.

Responses are pulled from a maintained source of truth, not assembled from memory or last quarter’s spreadsheet. When your pen test date changes, one place updates. Every questionnaire response stays current automatically.

Every response goes through an approval step before it leaves the building. Someone with authority signs off. Not as a rubber stamp, but as a genuine check that what you’re asserting is accurate and that you’re comfortable attesting to it.

And the whole thing is logged. What was asked. What was answered. Who approved it. When it was sent. Because the day you need to demonstrate that your vendor assessment process was rigorous is exactly the day you’ll be glad you kept records.

That’s not a fantasy. It’s just an operational process instead of an email thread.

The Liability Nobody Is Pricing In

Here’s what makes this more than a productivity problem.

When you complete a security questionnaire and return it to a customer or partner, you are making representations about your security posture. In some regulatory contexts — especially where data processing agreements are involved — those representations carry legal weight. If you assert that you have certain controls in place and you don’t, or you did at the time but the process has drifted, that’s not just an embarrassing gap. It’s a liability.

Most organizations treat the questionnaire as a sales friction problem. Something to get through so the deal can close. But the document you sent back is now in their files, timestamped, attributed to your company. If there’s ever an incident, an audit, or a dispute, it gets pulled.

The question is whether what you sent accurately reflected your posture at the time — and whether you can demonstrate that someone accountable reviewed and approved it before it went out.

A spreadsheet assembled by a compliance coordinator from a shared doc and forwarded by the account manager is a hard thing to stand behind.

Both Sides Deserve Better

The security questionnaire became theater because the infrastructure around it never kept up with what it was being asked to do. It scaled in volume — more vendors, more customers, more regulatory requirements — without scaling in rigor. The process stayed manual while the stakes got higher.

The answer isn’t to abolish questionnaires. Vendor risk is real. Compliance requirements are real. The need to make documented, defensible decisions about third-party security is real.

The answer is to treat questionnaire responses like the operational and legal artifacts they actually are. Structured intake on the receiving end. Defined ownership. Consistent, approved responses on the sending end. A full record of what was exchanged and who signed off.

Stop doing it over email and a shared Google doc. Build a process that means something.

Because right now, both sides are performing due diligence. Neither side is actually doing it.

Fortworx automatically detects incoming security questionnaires and routes them to the right team — so the process that should happen actually does. Start for free or book a demo.