Questionnaire TypeIdentify questionnaire type: SIG Lite, SIG Core, S...
Vendor NameExtract the responding vendor/company name...
Completion DateExtract the questionnaire completion date. Return ...
Respondent NameExtract the name of the person who completed the q...
Respondent TitleExtract the respondent job title...
Total QuestionsCount total number of questions in the questionnai...
Questions AnsweredCount number of questions answered (not N/A or bla...
N/A ResponsesCount number of N/A responses. Return as integer....
Governance ScoreAssess Information Security Governance maturity: S...
Access Control ScoreAssess Access Control maturity: Strong, Adequate, ...
Asset Management ScoreAssess Asset Management maturity: Strong, Adequate...
Data Protection ScoreAssess Data Protection/Privacy maturity: Strong, A...
Encryption ScoreAssess Encryption controls: Strong, Adequate, Need...
Network Security ScoreAssess Network Security maturity: Strong, Adequate...
Vulnerability Management ScoreAssess Vulnerability Management: Strong, Adequate,...
Incident Response ScoreAssess Incident Response capabilities: Strong, Ade...
Business Continuity ScoreAssess Business Continuity/DR: Strong, Adequate, N...
Vendor Management ScoreAssess Third-Party/Vendor Management: Strong, Adeq...
Physical Security ScoreAssess Physical Security controls: Strong, Adequat...
HR Security ScoreAssess HR Security (background checks, training): ...
Red FlagsList any critical red flags or concerning response...
Missing EvidenceList areas where supporting evidence or documentat...
Compensating ControlsList any compensating controls mentioned for contr...
Remediation RequiredIs remediation required before approval? Yes or No...
Remediation ItemsList specific items requiring remediation. Return ...
Overall MaturityOverall security maturity assessment: Advanced, Es...
RecommendationFinal recommendation: Approve, Conditional Approva...
Analyst NotesProvide summary notes and key observations from th...