Third-Party Vendor Access Review
Audit and document third-party vendor access to your environment
Create a vendor access review document for [VENDOR NAME]. Document: (1) What systems and data they can access, (2) Authentication method (SSO, VPN, direct), (3) User accounts and privilege levels, (4) Last access review date, (5) Business justification for continued access, (6) Compliance requirements (SOC2, ISO, etc.), (7) Recommendation: maintain, reduce, or revoke access.
Works on
⭐ M365 Copilot
(Best)
🟢 ChatGPT
🟠 Claude
Copy & Open in
Prompt is copied to your clipboard when you click
Tips for Best Results
- Review all vendor access quarterly at minimum
- Apply least privilege — remove access they no longer need
- Include vendor access in your incident response plans