In today’s world, software buyers rarely proceed with a vendor relationship without a full understanding of the vendor’s security practices before entering into any type of arrangement. They require certifications, compliance reports, and data handling procedures in advance; consequently, adding security documentation requests, compliance attestation requests, and audit report requests are never-ending burdens on sales teams.