How a simple security questionnaire turns into a can of worms

29 March 2026

Security questionnaires are often treated as a trap. That concern is understandable. A bad answer can look like risk, invite further scrutiny or even lose a sale. But in practice, many of the problems don’t come from the questionnaire itself, but from how it’s answered. Vendors often turn acceptable answers into confusing or concerning ones by trying to overexplain.

A common pattern, especially in technical teams, is to treat questions like ‘Do you have X?’ as strictly binary. Either the company has exactly that control, or it doesn’t. If what’s in place doesn’t perfectly match the question as written, the answer becomes ‘No’, usually followed by a waffling explanation trying to soften it. This leads to answers like, “Not currently in place, however we try to do Y, Z and Q…”. Technically accurate but commercially unhelpful.

These answers rarely reassure. They highlight gaps, create ambiguity and invite follow-up questions. In trying to be precise, vendors make themselves look higher risk. The more explanation that’s added, the more surface area there is for scrutiny. The more you try to explain and justify, the more questions you create.

Part of the problem is ownership. In many companies, questionnaires are handed to developers because they’re technical, or they fall to sales because they’re part of the sales process. Both approaches create problems, just in different ways. Developers default to literal interpretation. If it isn’t exactly true, they won’t say ‘Yes’, and they add caveats to avoid being wrong. That makes sense when writing code, but it doesn’t work here.

Sales teams take the opposite approach. They focus on getting through the process. They answer based on intent and move quickly. But they often lack knowledge of security controls and can overpromise, which creates problems later. Neither group is well suited to the task. Sales see questionnaires as friction, while developers see them as tedious and low value. The result is predictable. Answers are rushed, inconsistent and don’t land well.

The core issue is that security questionnaires sit in an awkward gap. They’re not technical specifications, and they’re not internal audits. They’re tools for assessing risk. Reviewers aren’t checking for perfect wording. They’re asking a simpler question: is this organisation well controlled and where are the risks?

The biggest improvement comes from changing the standard used to answer. Many teams implicitly apply a ‘beyond reasonable doubt’ test, only answering ‘Yes’ where the statement is perfectly true as written. That approach produces unnecessary ‘No (but…)’ answers. A more effective approach is closer to a ‘balance of probabilities’ standard. In other words, whether the controls in place meet the intent of the question in substance.

If they do, the answer is ‘Yes’, supported by a clear description of what’s actually in place. Not a defence and not a list of caveats, but a straightforward explanation. ‘No’ should be reserved for genuine, material gaps. This isn’t about overstating capability or claiming to have controls that don’t exist. If there’s a real gap, it should still be a ‘No’. The point is to avoid turning controls that already meet the intent into apparent weaknesses through overly literal interpretation.

This shift changes the outcome. Answers become clearer, more consistent and easier to review. Follow-up questions reduce and the overall risk profile is presented more accurately. Answering

← Back to blog
About | Contact | Legal | Terms of Use | Privacy Policy
Copyright © MMXXVI Cementarius Systems Ltd