You built a great product. Your champion at the enterprise loves it. The deal is progressing. Then their InfoSec team sends a security questionnaire — and three weeks later, the deal quietly dies.
This pattern is more common than most founders realize. Security questionnaires are the silent deal killer in B2B sales. Enterprise security teams aren't trying to slow you down; they're doing their job. But if your responses trigger the wrong signals, you're out — regardless of how good your product is.
Here's what enterprise security teams actually look for, and the specific red flags that send your questionnaire to the rejection pile.
Context: The most common questionnaire formats you'll encounter are the SIG Lite (Shared Assessments), the CAIQ (Cloud Security Alliance's Consensus Assessment), and custom questionnaires built on frameworks like NIST CSF or ISO 27001. The red flags below apply across all of them.
The Sections Enterprise Security Teams Check First
When a security analyst opens your 200-question questionnaire response, they don't start at question 1. They skip to the sections that, in their experience, reveal the most about your actual security maturity. If these sections look bad, the rest doesn't matter.
1. Access controls and identity management
This section almost always comes first in any serious questionnaire review. Analysts want to know: who can access your production systems, and what controls prevent unauthorized access?
The red flags that immediately signal immaturity:
- MFA is "available but not enforced" — this is a hard no for most enterprise InfoSec policies
- No mention of privileged access management (PAM) or at least differentiated access for admins vs. standard users
- No defined process for revoking access when an employee leaves
- Shared accounts or service accounts with no rotation policy
- No periodic access reviews — even annual is better than nothing
2. Incident response
Every serious enterprise buyer has experienced a vendor breach. They know that breaches happen. What they're evaluating is whether you'll handle it responsibly or hide it. The questions in this section are probing for:
- Do you have a documented incident response plan?
- What is your breach notification timeline? (Many enterprise contracts require 24–72 hour notification)
- Have you had any incidents in the past 24 months? If yes, how were they handled?
- Do you have a dedicated security contact or are incidents handled ad hoc?
The vague answer that kills deals: "We take security seriously and will notify affected parties in a timely manner." Timely means nothing. Give a specific number.
3. Data handling and retention
For any SaaS that processes customer data, enterprise buyers want to know exactly how that data is stored, who can see it, where it lives geographically, how long it's retained, and what happens to it when the contract ends.
The red flags:
- Data residency that conflicts with the buyer's regulatory requirements (e.g., EU data flowing to US infrastructure without SCCs)
- No defined data retention or deletion policy
- Inability to confirm customer data is logically separated from other tenants
- Vague answers about backup encryption ("data is encrypted" without specifying at-rest vs. in-transit, or encryption standards)
4. Vendor and subprocessor management
Enterprise buyers aren't just evaluating you — they're evaluating your supply chain. If a critical subprocessor you depend on has a breach, that's their problem too. They want to see that you've thought about this.
At minimum, they're looking for a list of critical subprocessors and some indication that you've reviewed their security posture. If you can produce a subprocessor list with links to their security pages or SOC 2 reports, you're ahead of most vendors they evaluate.
The Most Common Vague Answers That Kill Deals
Vague answers signal that you don't actually have a program — you have aspirations. Enterprise security teams have read thousands of questionnaires. They know the difference between a company that genuinely implements a control and one that wrote a policy document that nobody follows.
Red flag phrases to eliminate from your responses:
- "We follow industry best practices" — which ones? What framework? Name it.
- "Access is granted on a need-to-know basis" — this is the definition of least privilege, not evidence that you enforce it. Say how: "Access to production systems requires approval from the CISO, is provisioned via Okta with MFA, and is reviewed quarterly."
- "All data is encrypted" — encrypted with what? Where? AES-256 at rest via AWS KMS, TLS 1.2+ in transit is a real answer. "Data is encrypted" is not.
- "We have a dedicated security team" — if you're a 12-person startup, this means one person spends 20% of their time on security. That's fine, but describe what they actually do.
- "Employees receive regular security training" — how often? What format? Is completion tracked? "Annual security awareness training via KnowBe4, with 100% completion rate tracked and documented" is an answer.
The Missing Evidence Package Problem
A completed questionnaire without supporting documentation is, in the eyes of a mature enterprise InfoSec team, an unverified claim. Many enterprise security reviews explicitly ask for supporting documentation alongside the questionnaire. Even when they don't, offering evidence proactively demonstrates maturity.
The evidence package that closes the most objections:
- SOC 2 Type II report (or bridge letter if the report is older than 12 months)
- Penetration test executive summary (full report on NDA request)
- Information security policy (the top-level document)
- Data Processing Agreement (DPA) — pre-signed, ready to attach to the MSA
- Subprocessor list with data residency information
- Business continuity and disaster recovery plan summary
Companies that have a Complai trust page can share a single URL that contains all of this in a structured, always-current format. A link is more convincing than a ZIP file full of PDFs.
How to Answer SIG Lite, CAIQ, and Custom Questionnaires
Each questionnaire format has specific quirks, but the underlying approach is the same: answer specifically, cite your actual controls, and don't over-claim.
SIG Lite: The Standardized Information Gathering questionnaire covers 18 domains. The most scrutinized are B (Application & Interface Security), E (Human Resources Security), F (Physical & Environmental Security), G (IT Operations Management), and H (Access Control). SIG Lite responses are scored, so consistency matters — an answer in domain B that contradicts a statement in domain G will be flagged.
CAIQ: The Cloud Security Alliance's questionnaire is primarily used when your product is cloud-hosted (which it almost certainly is). It maps directly to the CCM (Cloud Controls Matrix). If you have a SOC 2 with CC6 coverage, you can map a significant portion of CAIQ responses directly from your SOC 2 controls. This is exactly what Complai automates.
Custom questionnaires: These are the most common and the most variable. The best strategy is to build a library of pre-approved answers organized by control domain. When a new questionnaire arrives, you're matching questions to pre-approved answers rather than writing fresh responses under deadline pressure.
Auto-Filling Questionnaires with Your Compliance Data
The manual process for completing a security questionnaire is: receive questionnaire, copy-paste questions into a document, route to various team members for input, reconcile conflicting answers, have a lawyer review claims, format and submit. For a 150-question SIG Lite, this typically takes 20–40 hours of coordinated work.
The automated process: your compliance platform ingests the questionnaire, maps questions to your existing control library, pre-fills answers from your documented policies and certifications, and flags only the gaps where human input is needed. Completion time drops to 2–4 hours.
This isn't theoretical — it's how Complai's questionnaire module works. Your SOC 2 audit evidence, your written policies, your access control documentation, and your incident response plan all feed into a knowledge base that answers security questions on your behalf. The output is a completed questionnaire that reflects your actual controls, not a best-guess approximation written under deadline pressure.
The bottom line: Enterprise security questionnaires are won or lost on specificity and evidence. Vague answers signal a paper compliance program. Specific answers with supporting documentation signal an actual security program. The difference between a deal that closes and one that stalls is often just the quality of 20 answers in the access controls section.