Skip to main content

Supplier Onboarding Guide

Ish Ladak avatar
Written by Ish Ladak
Updated over 2 weeks ago

This Supplier Onboarding Guide is designed to help your organisation get up and running on Risk Ledger. Whether you're completing your first assessment, inviting team members, or responding to client feedback, this guide will walk you through each step of the process.

Risk Ledger provides a single profile where you can demonstrate your security posture to multiple clients. This reduces duplication, streamlines compliance and helps you focus on what matters: maintaining strong security controls across your organisation and products.

This Supplier Onboarding Guide is designed to grow with you. We recommend bookmarking this page and referring back to it as needed. For more detailed walkthroughs, explore the full Help Centre or reach out to support@riskledger.com.

And you can find out more information regarding our Security, Privacy Policy and Terms of Service, here.


Getting Started on Risk Ledger

When your organisation is invited to join Risk Ledger as a supplier, the first step is to create your account. This enables you to complete your security assessment and share relevant information with your connected clients.

Once your account is active, you’ll be prompted to complete a brief setup process. This includes answering a short set of scoping questions, which help tailor the assessment framework to your organisation’s size, structure, and risk profile. Based on your responses, Risk Ledger generates a customised set of controls for you to review and complete.


Invite Flow

If a client invites your organisation to Risk Ledger, the person receiving the invitation will be guided through account creation and profile activation after clicking the link in the received email invite.

💡 If you have already set up a profile on Risk Ledger, then you don’t need to accept an invitation - you just need to send a Connection Request to your client as outlined in the relevant section below.


Adding Users and Creating Roles

If you need to bring in colleagues after the initial setup to collaborate with, you can do so by adding users. Each invited user will receive an email prompt to join your organisation’s profile. Please note, that only Admin and Lead Users can invite new users and assign roles.

Each user role provides a different level of access:

  • Admin: Full access to manage users, settings, accepting connection requests from client organisations and completing the assessment

  • Lead: Same permissions as Admin but acts as your organisation’s primary point of contact for user access requests.

  • Edit: Can complete the assessment but cannot change account settings

  • View: Read-only access

Users can be added via Settings > Users & Roles.

Best Practices

  • Log-in Portal - To log into the platform, please go to app.riskledger.com and sign in using your email and password. It’s worth bookmarking this page. Contact support@riskledger.com for any issues!

  • Personal vs Shared logins - To ensure robust security practices, we strongly encourage setting up individual user accounts for any colleagues that require access, instead of using shared logins

  • Multi-factor Authentication (MFA) - We require all users to set up MFA to access Risk Ledger, using either SMS or an authenticator. More information on authentication can be found here.


Assessment, Domains, Controls & Compliance Scores

The Risk Ledger assessment is organised into domains, each covering a key area of security (e.g., Access Control, Data Protection, Physical Security). Within each domain, you’ll find specific controls to review and respond to.

For detailed information on our assessment framework, questions and supplementary information, please visit our framework Knowledge Base.

Your compliance score is calculated based on how your answers align with your clients’ policies. You can view a breakdown of your score per domain for each client via the Clients tab.


How to Utilise Auto-suggest to Speed Up the Assessment Process

Auto-suggest allows you to pre-fill multiple controls with recommended responses based on documents and evidence you upload into Risk Ledger. It’s designed to reduce the manual effort required to complete your profile. It can only be used during your initial assessment.

Auto-suggest will:

  • Suggest answers for applicable controls

  • Allow you to review and adjust them before submission (though you will still need to manually add evidence to controls if you accept one of the suggested answers)


Product Level Answers (PLA)

Product Level Answers allow you to answer certain questions at the product or service level, rather than only at the organisational level. This is particularly useful if your security controls vary across different products or services your organisation offers.

You can:

  • Maintain organisational-level answers as a baseline

  • Add product-specific responses where needed

  • Share tailored information with clients per product

  • Download your assessment with product-level differences included

Products are managed via the Settings > Products page. Once added, you can apply product-level answers directly within the assessment to specific controls.


Uploading Evidence

Where relevant, you can upload supporting evidence to provide clients with further assurance. Evidence can be added to specific controls in the form of PDF documents, images, spreadsheets, or text.

Uploaded files are encrypted and securely stored. You can control visibility on a per-client basis.


Accepting and Sending Connection Requests

Your organisation will receive Connection Requests from clients who want to view your security profile. When you accept a Connection Request, that client can access your profile and will be able to review your completed assessment.

You can also send CRs to existing or prospective clients via the Clients tab. Simply search for the organisation and send a request.


Post-Assessment

Client Reviews

Once you submit your profile, connected clients are notified and will begin reviewing your responses against their internal policies.

You can track review progress and compliance status from the Clients tab.

Remediations

Clients may raise Remediation Requests if your answers fall short of their policy requirements. These will appear as action items within your assessment, and you’ll be able to provide updates and supporting evidence in response.

Discussions

Risk Ledger facilitates direct Discussions between you and your clients on specific controls. You can start or reply to discussions to clarify answers, provide context, or align on next steps.


Sharing Your Profile

You can share your security profile with additional clients who aren’t on the platform by sending them a Trust Centre Link. You only need to complete your assessment once; Risk Ledger allows you to reuse your profile with multiple clients, eliminating the need for multiple assessments.

To send a Trust Centre link, navigate to Trust Centre and create a share link, that you can forward directly or copy and paste to the right party.


Notifications

You’ll receive in-platform and email notifications for key events, including:

  • New connection requests

  • Client review updates

  • New remediation items

  • Discussion messages

  • Platform changes or updates

Ensure your notification settings are enabled and that key users have access to view updates in real-time. You can also adjust your notifications by going to Settings > My notifications


External Monitoring

External Monitoring is a feature that helps you understand your organisation's security posture from an outside perspective. It currently scans your email and web security configurations to identify potential security improvements.

Who can see my scan results?

Scan results are visible to External Monitoring customers, which allows them to see scan results alongside your assessment and Risk Ledger. This will help you:

  • Demonstrate your security posture with objective data

  • Support your assessment responses with evidence

  • Show your commitment to security improvements

How do I get started?

  1. Visit the External Monitoring section in your Risk Ledger account

  2. Review any pre-populated assets

  3. Add additional assets by clicking "add asset"

  4. Check your initial security findings


Trying Client Mode

If you’re finding value in the supplier mode of Risk Ledger, you can try client mode to begin managing your own supply chain. To do so, just switch to client mode using the toggle in the top left of the screen:

💡 For any further questions, please reach out to support@riskledger.com and we’ll be able to assist you further.

Did this answer your question?