Thorough due diligence is the key to successful outsourcing. We support you in the systematic review of potential vendors to make informed decisions and fulfil regulatory requirements.
Our clients trust our expertise in digital transformation, compliance, and risk management
30 Minutes • Non-binding • Immediately available
Or contact us directly:










Thorough due diligence should not be limited to document review alone. On-site visits, interviews with key individuals, and independent reference checks provide valuable insights that go beyond the obvious.
Years of Experience
Employees
Projects
Our approach to due diligence reviews is systematic, thorough, and tailored to your specific requirements.
Definition of the review scope and evaluation criteria
Development and distribution of tailored due diligence questionnaires
Document review, interviews, and on-site assessments where applicable
Analysis and evaluation of the information gathered
Preparation of due diligence reports with recommendations for action
"Sound due diligence is the best investment in successful vendor relationships. It creates transparency, minimises risks, and lays the foundation for long-term partnerships that endure even under difficult conditions."

Head of Information Security, Cyber Security
Expertise & Experience:
10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security
We offer you tailored solutions for your digital transformation
Comprehensive review of the financial stability and business development of potential vendors.
Assessment of the vendor's operational capability, processes, and resources.
Review of compliance with regulatory requirements as well as IT and data security.
Choose the area that fits your requirements
A well-founded risk analysis is the key to successful outsourcing decisions. We support you in the systematic identification, assessment, and management of all relevant risks in your outsourcing projects.
IT due diligence is a systematic assessment of potential IT vendors before contract signing. It evaluates IT security posture, data protection compliance, technical capabilities and operational risks. In regulated industries (banking, insurance), it is mandatory under MaRisk AT
9 and EBA outsourcing guidelines. The assessment typically includes document review, questionnaires, interviews and on-site audits for critical outsourcing arrangements.
A vendor due diligence checklist covers: IT security certifications (ISO 27001, SOC 2, TISAX), data protection compliance (GDPR, data processing agreements), financial stability and business continuity, disaster recovery and business continuity plans, references and track record, subcontractor management, regulatory requirements (MaRisk, DORA, NIS2) and exit strategies with data return procedures.
In financial services, MaRisk (AT 9), BAIT and EBA outsourcing guidelines require documented due diligence before any outsourcing arrangement. Since January 2025, DORA (Digital Operational Resilience Act) adds ICT third-party risk assessment requirements. Cross-industry, GDPR mandates data processor assessments, and NIS 2 imposes supply chain security obligations for critical infrastructure operators.
Duration depends on complexity and criticality. A basic screening takes
2 to
4 weeks, while a comprehensive due diligence for critical IT vendors takes
6 to
12 weeks. Regulated organisations face longer timelines due to additional compliance checks. A risk-based approach prioritises assessment depth by criticality — not every vendor requires a full-scope review.
IT due diligence focuses on technical aspects: IT architecture, security concepts, software quality and technical debt. Vendor due diligence is broader and also covers financial stability, compliance, operational capabilities and strategic fit. For IT outsourcing, both overlap: the IT due diligence becomes a core component of the comprehensive vendor due diligence assessment.
Key cybersecurity assessment areas include: information security management system (ISMS per ISO 27001), access control and authorisation concepts, encryption (data at rest and in transit), network security and segmentation, patch and vulnerability management, security monitoring and incident response capabilities, backup and disaster recovery, and penetration test results and audit findings.
ADVISORI supports the entire due diligence process: from developing tailored assessment frameworks and questionnaires through conducting assessments (document review, interviews, on-site audits) to delivering the final due diligence report with risk ratings and recommendations. Our team brings regulatory expertise (MaRisk, BAIT, DORA, NIS2) and sector-specific knowledge from financial services and IT.
Discover how we support companies in their digital transformation
Klöckner & Co
Digital Transformation in Steel Trading

Siemens
Smart Manufacturing Solutions for Maximum Value Creation

Festo
Intelligent Networking for Future-Proof Production Systems

Bosch
AI Process Optimization for Improved Production Efficiency

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.
Our clients trust our expertise in digital transformation, compliance, and risk management
Schedule a strategic consultation with our experts now
30 Minutes • Non-binding • Immediately available
Direct hotline for decision-makers
Strategic inquiries via email
For complex inquiries or if you want to provide specific information in advance
Discover our latest articles, expert knowledge and practical guides about Due Diligence

Cyber insurance covers financial losses from cyberattacks, data breaches, and IT outages. This guide explains what insurers require in 2026, coverage types, costs by company size, and how to choose the right policy — including how ISO 27001 certification reduces premiums.

Over 30,000 CVEs are published annually. Effective vulnerability management prioritizes what matters most to your organization and remediates before attackers exploit. This guide covers the full lifecycle: discovery, scanning, risk-based prioritization, remediation, and compliance.

The human layer remains the weakest link in cybersecurity. This guide covers how to build an effective security awareness program, run phishing simulations, design role-based training, and measure whether your program actually reduces risk — with benchmarks and KPIs.

Penetration testing reveals vulnerabilities before attackers exploit them. This comprehensive guide covers black box, grey box, and white box methods, the 5-phase pentest process, provider selection criteria, DORA TLPT requirements, and cost benchmarks for every test type.

Business continuity software automates BIA, plan management, exercise tracking, and incident response. This comparison reviews leading BCM platforms, selection criteria, DORA alignment, and which solution fits organizations at different maturity levels.

SOC 2 and ISO 27001 are the most requested security certifications. This practical comparison covers scope, cost, timeline, customer expectations, regulatory alignment, and the 70% control overlap — helping you decide which to pursue (or whether you need both).