HECVAT is a standardized security assessment framework designed specifically for higher education in collaboration with EDUCAUSE, Internet2, and REN-ISAC. It is a questionnaire that evaluates the cybersecurity, privacy, and AI risk of third-party vendors.
HECVAT encourages alignment with a consistent set of security controls, helping universities ensure their vendors protecting sensitive data meet the rigorous security standards required by the academic community.
In 2025, the toolkit underwent its most significant transformation with the release of HECVAT 4.0, which moved from a series of disparate spreadsheets to a unified, dynamic framework.
Why was the HECVAT created?
Originally launched in 2016 by the Higher Education Information Security Council (HEISC), Internet2, and REN-ISAC, HECVAT was driven by the need to standardize a chaotic procurement landscape. In 2026, the drivers for HECVAT have expanded:
The AI tsunami: The rapid integration of Generative AI into educational tools requires specialized vetting for data bias, model security, and training data privacy.
Unified compliance: Modern data laws (like the updated GDPR, various US state privacy acts, and newer AI-specific regulations) require more than just a "check-the-box" security list.
Persona-based guidance: HECVAT now provides tailored documentation for three distinct groups: Evaluators (IT Security), Providers (Vendors), and Campus Communities (End Users).
NIST CSF 2.0 alignment: HECVAT 4.0 is natively mapped to the NIST Cybersecurity Framework 2.0, ensuring it stays relevant with global security standards.
What are the benefits of using HECVAT?
HECVAT provides a standardized, industry-aligned framework that allows higher education security teams to consistently evaluate a vendor’s security posture.
Some of the key benefits include:
Efficiency: Instead of answering unique questionnaires for every university, a vendor completes the HECVAT once per year and shares it across the community.
Standardized scoring: HECVAT 4.0 introduced a smarter scoring methodology that uses risk-based weights and industry-specific factors to provide a more accurate risk profile.
Reduced vendor Friction: By aligning with common frameworks like SOC 2 and ISO 27001, HECVAT reduces the "audit fatigue" faced by service providers.
Who Uses HECVAT?
HECVAT is the "gold standard" for third-party risk management across the Ivy League, major state systems (like the University of California and Cal State), and international research institutions.
In previous years, you could find completed HECVAT assessments from organizations on the Community Broker Index (CBI). However, to ensure the latest security data — particularly for Artificial Intelligence (AI) and Privacy modules — are reviewed, the HECVAT community has evolved in the following ways:
Retirement of the CBI: The centralized CBI was officially retired on July 31, 2025. It has been replaced by more secure, direct-sharing workflows that prevent the use of "stale" or outdated assessments.
Vendor trust centers: Most major vendors (such as Microsoft, Google, and Atlassian) now host their own secure Trust Centers. Institutions can request the latest HECVAT 4.0 directly through these portals, ensuring they are reviewing a vendor’s current security posture rather than not an outdated assessment. You can set up your own trust portal with UpGuard's tool, Trust Exchange.
GRC integration: High-maturity institutions now use automated Vendor Risk Management (VRM) platforms that ingest HECVAT data via API. This allows for a more dynamic "Community" where risk scores are updated in real-time as vendors refresh their documentation.
What's in the Unified HECVAT 4.0 Toolkit?
In 2025, the HECVAT moved away from static, separate files for "Full" or "Lite" versions. Version 4.0 is now a Single Unified Tool that uses conditional logic to adapt to the vendor’s specific profile, making the questionnaire more relevant, and therefore, easier to complete.
There are no longer separate files for "Full" or "Lite" HECVAT versions. Everything is contained within the Unified HECVAT Tool.
Here's an overview of some of the features of the updated HECVAT 4 Toolkit:
1. The "Triage First" workflow
The process now begins with a "START HERE" (Triage) tab. By answering 8-10 high-level screener questions about the product's architecture (e.g., "Is this a SaaS tool?" or "Does it host data on-prem?"), the workbook uses conditional logic to hide or show relevant tabs.
All users begin on the "START HERE" tab of the HECVAT 4 assessment.
This eliminates the "compliance fatigue" caused by vendors answering irrelevant data center questions for cloud-only tools.
Here's a breakdown of the roles of universities and vendors within the HECVAT 4 workflow:
Phase
Who is doing it?
What they touch
Why?
1. The data entry
The vendor
All questions "unlocked" upon completing START HERE tab.
These are all the relevant questions to a vendor's unique security context.
2. The calculation
The Excel logic
Hidden "Scoring" tabs
The file has built-in formulas that turn those "Yes/No" answers into a percentage grade.
3. The audit
The University
"Institution evaluation" tab
The University’s security team looks at this tab to see the results.
2. Tiered question set
The "Core 60": Formerly known as HECVAT Lite, this is now a filtered view within the main tool. It contains ~61 essential questions that contain an asterisk (*). These "critical" questions evaluate a vendor's baseline security, making them the only questions a vendor needs to answer for a low-risk assessment.
The full assessment: This remains the "deep dive" for high-risk vendors (PII, PHI, etc.) and contains approximately 250–270 questions depending on the modules activated.
3. 2026 specialized modules
AI & Machine Learning Tab: This is a major addition. It specifically addresses NIST AI RMF alignment, focusing on data used for model training, the "opt-out" capability for institutional data in LLM tuning, and transparency around hallucination risks.
Enhanced privacy module: Developed by the EDUCAUSE Chief Privacy Officers (CPO) Community, this tab is designed to meet modern standards like GDPR and the "necessity" principle. It focuses heavily on cross-border data flows and residency requirements.
4. Persona-based documentation
To lower the barrier to entry, EDUCAUSE now provides three distinct "Field Guides":
Evaluators (IT security): Technical scoring rubrics and "Red Flag" guides.
Providers (vendors): Step-by-step submission checklists to speed up procurement.
Campus communities (end users): Simplified summaries to help departments understand the risk of the tools they buy.
Preparing for a VRM program using HECVAT 4.0
Here are the actionable items that should be completed before establishing HECVAT as a core pillar of your Vendor Risk Management (VRM) program:
Use the unified HECVAT Triage logic
In the past, schools had to choose between "Full," "Lite," or "On-Premise" files. With HECVAT 4.0, these have been consolidated into a single, intelligent toolkit.
Streamlined Scoping: Instead of sending different files, schools now provide the unified HECVAT. The vendor completes the Triage tab first.
Dynamic Questions: Based on the vendor’s answers regarding data classification (e.g., PII, PHI, or PCI) and service type (SaaS vs. On-Premise), the spreadsheet automatically shows or hides relevant sections.
Action Item: Ensure your procurement team understands how to verify that a vendor has answered the Triage questions accurately so that the "Full" assessment sections are triggered for high-risk data.
Determine risk acceptance and AI governance
During the risk assessment process, schools must determine the level of risk they are willing to accept. In 2026, this must extend beyond general security to include AI Governance.
Internal Grading: Schools should create an internal grading system to determine which "Red Flag" answers in the HECVAT (such as lack of MFA or data residency outside the country) are non-negotiable.
AI & Privacy Review: With HECVAT 4.0’s dedicated sections on Artificial Intelligence and Machine Learning, schools must decide if they allow vendors to use institutional data to train Large Language Models (LLMs). This risk acceptance level should be clearly defined before the assessment begins.
Once planning is complete, you can begin the integration process:
Requesting HECVAT from vendors
Whether newly onboarded or long-time partners, schools should request the HECVAT 4.0 toolkit.
Documentation Bundling: In the same communication, schools should request supporting evidence mentioned in the HECVAT, such as SOC 2 Type II reports, VPATs for accessibility, and updated Privacy Policies.
The "Freshness" Rule: As the Community Broker Index (CBI) is no longer the primary source for shared assessments, schools should request a HECVAT completed within the last 12 months.
Assess Vendor Risk and identify security gaps
Once the results are submitted, the security team begins the due diligence process.
Risk Tiering:Classify vendors by risk level (Low, Medium, High, Critical). If a vendor shows a low HECVAT score or fails the "Core" security requirements, they should be prioritized for deep-dive remediation.
Decision Gatekeeping: If a vendor is classified as High or Critical Risk and cannot remediate the gaps, schools should be prepared to reject the vendor or seek alternatives.
Catalog vendors and centralize risk data
Create a centralized vendor catalog to track remediation progress.
Prioritize Remediation: Use the catalog to track vendors handling sensitive data. A centralized system ensures that if a vendor’s security posture changes (e.g., they lose a certification), your team is alerted immediately.
Unified Visibility: Use tools to keep an accurate catalog of vendors and their security postures, ensuring that HECVAT data is paired with real-time threat intelligence.
Managing VRM programs with HECVAT
Successful VRM programs are iterative; they must mature to keep up with evolving cyber threats.
Practice continuous monitoring
A HECVAT is a "point-in-time" snapshot. To manage risk in 2026, it must be paired with continuous monitoring.
Real-time alerts: Use attack surface monitoring tools to identify unpatched vulnerabilities or data leaks in between annual HECVAT updates.
Supply chain visibility: Monitor third- and fourth-party risks to ensure that the vendors your vendors use are also maintaining high security standards.
Perform "triggered" audits and reviews
While annual reviews are standard, "Triggered Assessments" are now best practice.
Major changes: Require a new HECVAT whenever a vendor undergoes a major architectural change, a change in ownership, or introduces significant new AI features.
Bi-annual reviews: For "critical" tier vendors, bi-annual reviews of HECVAT data may be necessary to identify emerging third-party risks.
To streamline your vendor risk assessment process, consider offloading time-consuming manual tasks by using a VRM platform like UpGuard.
Build a vendor maturity model
As your organization grows, vendor security must grow with it. Use a maturity model to track how vendors improve over time.
Maturity Pathways:
Ad Hoc: No formal third-party risk management.
Developing: Use of HECVAT for new procurements only.
Defined: Established HECVAT process for all vendors; risk acceptance levels set.
Operational: Continuous monitoring integrated with HECVAT data.