What's inside a typical enterprise security questionnaire
Access controls, data residency and encryption, incident response procedures, sub-processor list and data flow map, business continuity, vulnerability management, penetration testing history - and increasingly, an AI security addendum covering prompt injection controls, LLM data flow, third-party model trust, and model governance. Each section needs answers grounded in your actual stack, not copied from a policy template.