Skip to the main content.

Modernize & Transform

Built to help you reimagine IT operations, empower your workforce, and leverage AI-powered tools to stay ahead of the curve.

Untitled design (3)

Empower My Team

We bring together the best of Microsoft’s cloud ecosystem and productivity tools to help your people thrive.

Untitled design (3)

Build My Infrastructure

We offer a comprehensive suite of infrastructure services tailored to support your business goals today and scale for the future

Untitled design (3)

IT Services

Our managed and co-managed IT service plans deliver a responsive and innovative engagement to support your IT needs, improve employee experience, and drive growth for your business. 

Untitled design (3)

Cybersecurity Services

Sourcepass offers innovative solutions, including SOC, GRC, Security Assessments, and more to protect your business.

Untitled design (3)

Professional Services

Grow your business with cloud migrations, infrastructure refreshes, M&A integrations, staff augmentation, technical assessments, and more.

Untitled design (3)

Resource Library

Stay ahead, stay connected, and discover the future of IT with Sourcepass.

Untitled design (3)

Events & Webinars

Dive into a dynamic calendar of webinars and in-person gatherings designed to illuminate the latest in managed IT services, cybersecurity, and automation.

Untitled design (3)

Resources by Role

Explore key resources, eBooks, video trainings, and more curated for CEOs, CFOs, CIOs, CISOs, and technology leaders!

Untitled design (3)

The Sourcepass Story

Sourcepass aims to be different. It is owned and operated by technology, security, and managed services experts who are passionate about delivering an IT experience that clients love.

Untitled design (3)

The Sourcepass Experience

At Sourcepass, we’re rewriting the IT and cybersecurity experience by helping businesses focus on what they do best, while we deliver the infrastructure, insights, and innovation to help them thrive.

Untitled design (3)

 

Operational Due Diligence IT: What LPs Expect from Security Controls

 
Operational Due Diligence IT: What LPs Expect from Security Controls

Operational due diligence IT has become a standard component of the fundraising process for private funds. Limited partners now expect managers to demonstrate mature technology governance, documented cybersecurity controls, and transparent monitoring practices.

A decade ago, operational due diligence focused primarily on financial reporting, valuation controls, and service provider relationships. Today, cybersecurity risk and IT governance are routinely included in limited partner (LP) diligence reviews. Many investors now request formal security documentation, operational controls evidence, and independent assurance reports before committing capital.

For fund managers, this shift does not simply reflect rising cyber threats. It reflects a broader expectation that technology risk is operational risk. Firms that can clearly demonstrate structured IT governance, documented controls, and ongoing monitoring often experience a smoother due diligence process.

This article explains the technology expectations shaping modern operational due diligence and how fund managers can prepare their IT environment to meet LP cybersecurity expectations.

 

Why Operational Due Diligence Now Includes IT Controls

Operational due diligence (ODD) evaluates how investment firms manage operational risk. Technology infrastructure, cybersecurity governance, and vendor oversight now play a visible role in that assessment.

Institutional investors recognize that cyber incidents can disrupt operations, expose sensitive investor data, and create reputational risk for both the fund and its investors.

Several industry frameworks have helped formalize these expectations:

  • The guidance from the Institutional Limited Partners Association on operational transparency
  • Cybersecurity risk management practices described by the National Institute of Standards and Technology
  • Security control and audit reporting frameworks developed by the American Institute of Certified Public Accountants

These frameworks increasingly influence how LPs structure technology-related diligence questions.

For fund managers, this means operational due diligence IT readiness must include clear governance structures, documented security policies, and verifiable evidence that controls operate as intended.

 

Common Technology Questions in ODD Questionnaires

LP cybersecurity expectations typically appear in structured operational due diligence questionnaires. These questions aim to determine whether a fund has implemented formal security practices rather than relying on ad hoc IT management.

Common areas of inquiry include:

 

Identity and Access Management

Investors want to understand how firms control access to sensitive data and investment systems.

Typical questions include:

  • How are user accounts provisioned and removed?
  • Is multi-factor authentication required?
  • Are privileged accounts monitored or restricted?

For firms operating in Microsoft 365 environments, this often involves demonstrating identity protections such as conditional access policies and multi-factor authentication.

 

Data Protection and Encryption

LPs frequently request information on how sensitive data is protected.

This may include:

  • Encryption of data at rest and in transit
  • Email security controls
  • Secure document sharing practices
  • Backup and recovery procedures

The goal is to confirm that investor communications, deal documents, and financial records are appropriately protected.

 

Incident Response and Business Continuity

Operational resilience is a key component of operational due diligence IT reviews.

Investors may ask for:

  • A documented incident response plan
  • Evidence of tested backup and recovery processes
  • Business continuity planning documentation

These controls help ensure firms can maintain operations during security incidents or technology disruptions.

 

The Role of Evidence-Based Security Controls

LPs increasingly expect evidence rather than policy statements.

Instead of simply confirming that security policies exist, investors may request supporting documentation such as:

  • Access control logs
  • Endpoint monitoring reports
  • Security awareness training records
  • Vulnerability assessment results

Evidence-based security demonstrates that controls are not only documented but actively operating.

For example, centralized logging within platforms such as Microsoft Defender or Microsoft Entra ID can provide visibility into authentication activity, suspicious behavior, and identity risk signals.

These records help demonstrate that security monitoring occurs continuously rather than periodically.

 

Continuous Monitoring and Security Operations

Operational due diligence IT reviews increasingly evaluate how security is monitored between formal audits.

Continuous monitoring may include:

  • Endpoint detection and response
  • Security event monitoring
  • Automated alerting and response workflows
  • Regular vulnerability scanning

Security operations capabilities help firms detect and respond to threats before they become operational incidents.

Many investment firms now rely on managed security monitoring to maintain consistent oversight without building a full internal security operations center.

 

Documentation and Audit Readiness

Strong documentation remains one of the most important elements of ODD preparation.

Investors often request:

  • Security policies and procedures
  • IT governance documentation
  • Asset inventories
  • Vendor security reviews
  • Incident response plans

Maintaining centralized documentation allows firms to respond quickly to diligence requests and reduces delays during fundraising cycles.

Documentation also supports independent verification through formal assurance reports.

 

SOC Reports and Third-Party Assurance

Many LPs request independent assurance reports that validate the effectiveness of operational controls.

The most common example is a SOC examination performed under standards defined by the American Institute of Certified Public Accountants.

A SOC 2 report evaluates how organizations manage controls related to security, availability, and confidentiality. These reports provide investors with independent confirmation that control processes are operating effectively over time.

Additional details about SOC reporting can be found in the AICPA guidance on System and Organization Controls.

 

Vendor Risk Management Expectations

Third-party technology providers introduce additional operational risk. LPs increasingly ask fund managers to demonstrate oversight of these vendors.

Typical expectations include:

  • Vendor security assessments
  • Contractual data protection requirements
  • Ongoing monitoring of critical providers
  • Incident notification procedures

This applies to core systems such as portfolio management platforms, fund administrators, and cloud providers.

Clear vendor governance demonstrates that firms understand how external technology partners affect operational risk.

 

Transparent Security Reporting

Operational due diligence increasingly emphasizes transparency rather than perfection.

Investors generally expect firms to demonstrate:

  • Clear reporting structures for security incidents
  • Escalation processes for operational risks
  • Regular reviews of cybersecurity posture
  • Defined ownership of technology governance

Transparency signals mature operational leadership and reduces uncertainty for investors.

 

Operational Due Diligence IT as a Fundraising Enabler

Technology readiness does more than satisfy investor questionnaires. It directly influences fundraising efficiency.

When firms maintain documented controls, centralized monitoring, and audit-ready records, they can respond to LP diligence requests quickly and confidently.

Benefits include:

  • Faster responses to operational due diligence requests
  • Greater investor confidence in operational controls
  • Reduced friction during fundraising cycles
  • Clear governance expectations across the organization

Operational due diligence IT readiness ultimately supports the credibility of the broader investment platform.

 

FAQ

What is operational due diligence IT?

Operational due diligence IT refers to the evaluation of a firm's technology infrastructure, cybersecurity practices, and operational controls during the investment due diligence process. Limited partners review these controls to understand how firms manage technology risk, protect investor data, and maintain operational continuity.

Why do LPs evaluate cybersecurity during operational due diligence?

LPs evaluate cybersecurity because cyber incidents can disrupt fund operations, expose confidential information, and create reputational risk. As a result, operational due diligence now includes assessments of security governance, access controls, monitoring practices, and incident response planning.

What technology documentation do LPs typically request?

LPs commonly request documentation such as security policies, incident response plans, access control procedures, vendor risk assessments, and independent assurance reports. They may also ask for evidence of monitoring activities, including logs or vulnerability assessment reports.

Do private funds need a SOC 2 report?

Not all funds require a SOC 2 report, but many institutional investors view it as strong evidence that operational controls are documented and functioning effectively. A SOC report provides independent validation of security and operational processes, which can streamline due diligence discussions.

How can firms prepare for LP cybersecurity expectations?

Firms can prepare by documenting security policies, implementing identity protection controls, maintaining centralized logging and monitoring, conducting vendor risk reviews, and ensuring incident response procedures are defined and tested. These practices help demonstrate operational maturity during operational due diligence IT reviews.