Skip to content
← All articles

May 17, 2026

Vendor contracts reveal your compliance gaps

By Ben Draffin · Director of Security at Decagon

Before your security team can credibly answer an enterprise customer’s questionnaire, someone else has probably already asked you the same questions — in a different format, on a vendor’s paper. Foundation-model providers, cloud platforms, and security vendors all run their own reviews. Most teams read those inbound asks defensively. There is a more useful read available.

What your vendors require of you often reveals what you should already be doing internally. Their terms reflect lessons from hundreds of enterprise customers — including buyers who will show up on your side of the table next quarter.

Vendor security review sits at the intersection of procurement friction and program design. In onboarding cycles at Decagon, I’ve seen the same pattern: gaps flagged by a model provider’s cyber use case form are the same gaps that stall customer diligence — not because frameworks are wrong, but because market pressure moves faster than policy committees.

The defensive read vs. the diagnostic read

The defensive read is familiar: limit liability, scrutinize subprocessors, verify SOC reports, clear the vendor so engineering can ship. The diagnostic read asks a different question — if we could not pass this vendor’s security review, would we also struggle with our own enterprise customers?

When a vendor requires cyber use case documentation, model abuse monitoring, or incident notification within a defined window, it is worth asking why. Often, their enterprise customers demanded it. The same buyers knocking on your door are shaping that vendor’s template in real time.

That does not mean every vendor ask becomes mandatory for your program. It does mean repeated asks across vendors and prospects are a prioritized signal — often more current than an annual policy refresh.

Building a compliance stack from vendor terms

The exercise is straightforward and does not require new software.

1. Collect

Gather security exhibits, DPAs, and cyber use case forms from your highest-impact vendors — especially AI infrastructure and anything in the critical path of customer data or model inference.

2. Extract

List every control the vendor requires of you, not what they promise to you. Focus on obligations, not marketing language.

3. Map

For each requirement, map to an internal policy, a technical control with evidence, or an explicit gap.

4. Prioritize

Rank gaps that appear in multiple vendor contracts and in your own enterprise security reviews. Overlap is the roadmap.

You are reverse-engineering a compliance stack from terms you did not write. For AI-native companies, that stack is often ahead of generic framework guidance.

Why this works when frameworks lag

Frameworks move on revision cycles. Vendor contracts and customer questionnaires converge faster because revenue is on the line. The controls that show up repeatedly — retention for model inputs, prohibitions on training on customer data, human review for high-risk outputs — become the de facto standard before they are the de jure standard.

The table below is illustrative, not exhaustive. The point is pattern recognition across sources, not checkbox parity with any single framework.

Control theme Often appears in vendor reviews Often appears in enterprise AI diligence
No training / fine-tuning on customer data Yes Yes
Input retention and deletion timing Yes Yes
Model subprocessors and data flow Yes Yes
Safety / red-team evidence Increasingly Increasingly
Human oversight for high-risk actions Yes Yes

If three vendors and two active prospects ask for the same artifact you do not have, that is not noise. It is sequencing data for your program.

Guardrails (so the mirror stays useful)

Filter through actual risk and customer commitments. Not every vendor clause belongs in your control set.

Watch for convergence. The same requirement from legal-facing vendors, security-facing vendors, and live deals is a strong signal.

Update policy when the market already expects it. Policy catching up to buyer reality is usually faster than policy catching up to a framework revision.

When a vendor asks you to document acceptable model uses or escalation paths, they are encoding their own enterprise sales motion. You can adopt the checklist — or recognize that your customer-facing trust materials need the same clarity. Either way, reading diagnostically beats reading defensively.

Closing the loop with customer diligence

For your next vendor onboarding, ask whether failure on the vendor’s review would predict failure on your largest customer’s review. If the answer is yes, vendor contracts are not a sideshow. They are one of the best mirrors available for what “enterprise-ready” means in your category this year.


Previous: Redlines as a maturity diagnostic · Next: Coding agents, controls, and policies

Newsletter

Email when I publish.

You'll get a confirmation email first.

Pushback? LinkedIn is fine.