What are you looking for?

Get help straight from our team...

Step 3: Byte-Sized Compliance - CyberSecurity - Vendor Reviews for Small Companies

CyberSecurity

Step 3: Byte-Sized Compliance - CyberSecurity - Vendor Reviews for Small Companies

Completing the IT Security Vendor Inventory (FORM 2-91-1)

Last updated on 23 Feb, 2026

Why This Matters

Most small mortgage companies do not operate their own servers or proprietary technology. Instead, they rely on third-party vendors for nearly every system that stores, transmits, or processes customer Non-Public Personal Information (“NPI”).

FORM 2-91-1 IT Vendor Review Ch…

This means your vendor list is not “IT paperwork.”
It is your cybersecurity footprint.

A company with no vendor inventory cannot credibly claim it understands its risk.

What This Form Is (and Isn’t)

FORM 2-91-1 is a vendor cybersecurity inventory and validation checklist.

FORM 2-91-1 IT Vendor Review Ch…

It is designed for companies that:

  • Are small

  • Are mostly cloud-based

  • Use third-party systems for core operations

  • Need a simple way to document vendor due diligence

This form is not a full vendor management program. It is the minimum defensible proof that you:

  1. Know your vendors, and

  2. Took reasonable steps to confirm they are not reckless with consumer data.

Step-by-Step: How to Complete FORM 2-91-1

Step 1 — List Vendors by Category (Not by Memory)

2026-02-05_23-41-35.PNG

Start with the vendor categories already in the form. These categories cover the “usual suspects” in a mortgage company:

FORM 2-91-1 IT Vendor Review Ch…

  • E-Mail

  • Loan Origination System (LOS)

  • E-Disclosure

  • Data Backup

  • Web 1003 Application

  • Pricing and Eligibility

  • Document Management

  • E-Fax

  • Voice-Mail/Telephony

  • Network / Internet Service

  • Office Support (Cleaner/Landlord)

  • Courier

Practical tip:
If you are stuck, open your bank/credit card statement and scan for recurring monthly software charges. That list is usually more accurate than anyone’s memory.

Step 2 — Confirm the Vendor Name Exactly

Use the vendor’s legal or platform name (example: “Google Workspace” not “Gmail”).

This prevents confusion later when:

  • Auditors ask for documentation

  • A vendor is acquired and renamed

  • You are asked “who stores your data?”

Step 3 — Identify the Vendor’s Audit or Certification Status

The form gives four methods for validating vendor cybersecurity:

FORM 2-91-1 IT Vendor Review Ch…

  • Qualified audits of the technology

  • Vendor is regulated/supervised by a similar authority

  • Confirmation of ISO 27001 or similar

  • Vendor not chosen by us (required use)

This is the core of the form.

How to Validate Vendors Have Their Own Security Protocols

This is where most small companies freeze up. The good news is: you do not need to be a cybersecurity engineer.

You need to document reasonable verification.

Method 1 — “Vendor Audit Certification”

For most vendors, this means they can provide one of the following:

  • SOC 2 Type II report (most common)

  • SOC 1 Type II (less relevant, but still useful)

  • ISO 27001 certification

  • Independent penetration test summary (less common)

What to do:

  • Ask the vendor for the report (or a summary letter)

  • If they won’t provide it, ask for:

    • a security whitepaper, or

    • a compliance attestation

What not to do:

  • Don’t accept “we take security seriously” as evidence.

Method 2 — “Supervised / Regulated Vendor”

This is useful when the vendor is:

  • A regulated bank

  • A regulated financial institution

  • A major credit bureau or similar provider

This is explicitly referenced as an acceptable basis for reliance in the form.

FORM 2-91-1 IT Vendor Review Ch…

What to document:

  • The vendor is regulated

  • The regulator type (example: bank regulator, SEC, FINRA, etc.)

  • The nature of the service

Method 3 — “ISO 27001 or Similar”

This is a clean checkbox if the vendor can provide:

  • An ISO/SOC/SOC2 certificate

  • The certificate scope statement

Important:
ISO 27001 only helps if the certificate scope actually covers the service you use.

Example:

  • “ISO 27001 for corporate headquarters” is not as strong as

  • “ISO 27001 for cloud platform operations.”

Method 4 — “3rd Party Vetting”

This is a catch-all category for situations where the vendor:

  • Is selected by a lender, investor, or LOS ecosystem

  • Is required for participation in a platform

  • Is industry-standard and unavoidable

The form explicitly recognizes this scenario.

FORM 2-91-1 IT Vendor Review Ch…

What to document:

  • “Required by third party”

  • “Vendor not selected by company”

  • “Due diligence is performed by platform owner”

What a Completed Form Should Look Like

A completed form should not have blanks for key vendors.

At minimum, you should see vendors listed for:

FORM 2-91-1 IT Vendor Review Ch…

  • Email

  • LOS

  • Credit ordering

  • Document management / storage

  • E-sign / e-disclosure

  • Internet service provider

  • Backup (if separate)

Common Findings (Small Mortgage Companies)

When you complete this form honestly, you will usually discover:

  1. No one can name all vendors off the top of their head

  2. There is no written record of vendor security validation

  3. Credit and document vendors are the largest NPI risk

  4. “Backup” is assumed but not confirmed

  5. Office support vendors (cleaner/landlord) are ignored

  6. Email is the #1 NPI exposure point

  7. No one has assigned ownership for vendor review

These findings are normal. The purpose of the form is to make them visible.

Minimum Documentation You Should Retain

For each vendor listed, retain at least one of the following:

  • SOC report (or SOC summary letter)

  • ISO 27001 certificate

  • Vendor security whitepaper

  • Vendor’s written statement of compliance

  • Screenshot or copy of the vendor’s security page

  • Contract clause showing security obligations

You do not need to store a 90-page SOC report for every vendor, but you do need some proof that you asked and reviewed.

Frequency and Ownership

This vendor inventory should be:

  • Reviewed at least annually
    FORM 2-91-1 IT Vendor Review Ch…

  • Updated whenever:

    • a new vendor is added

    • a vendor changes services

    • a vendor is acquired

    • a security incident occurs

The form includes an “Audited by” signature block for accountability.

FORM 2-91-1 IT Vendor Review Ch…

Bottom Line

For small mortgage companies, vendor oversight is not optional. It is the core cybersecurity control.

Completing FORM 2-91-1 provides evidence that:

  • You know where NPI lives

  • You know who touches it

  • You have verified that vendors have security controls

  • You can explain your vendor reliance to an auditor or regulator

If your company is “all cloud,” your vendors are your IT department. This form is how you prove you understand that reality.


Did you find this article helpful?
Previous

Step 4: Byte-Sized CyberSecurity Risk Assessments - Physical Device Inventory

Next