Third Party Risk Management
Click any control badge to view its details. Download SVG
Key Control Areas
Third Party Classification and Risk Tiering
Due Diligence and Security Assessment
Contract Security Requirements
Continuous Monitoring and Reassessment
Fourth Party and Sub-Processor Risk
Incident Response and Notification
Access Management and Data Controls
Cyber Insurance Verification
Exit Planning and Data Return
TPRM Programme Governance
When to Use
Any organisation using cloud services, SaaS platforms, or outsourced IT services. Regulated industries with explicit supply chain risk requirements (financial services under DORA/PRA SS2/21, healthcare under HIPAA, government under FISMA). Organisations processing personal data under GDPR (data processor obligations). Organisations that have experienced a third party security incident. Any entity whose customers ask for SOC 2 Type II reports or completed security questionnaires.
When NOT to Use
Organisations with no external vendor dependencies (extremely rare). Very small teams where all services are built and operated internally with no cloud or SaaS usage.
Typical Challenges
Assessment fatigue — Tier 1 due diligence on every vendor regardless of risk. Questionnaire theatre — vendors provide policy documents that do not reflect operational reality. Point-in-time assessment treated as continuous assurance. Fourth party risk invisible because vendors will not disclose their sub-processors. Exit planning deferred because it implies the relationship will fail. TPRM team understaffed relative to vendor population (500+ vendors, 2-person team). Vendors resisting right-to-audit clauses. SOC 2 Type I presented as equivalent to Type II. Cyber insurance verification not part of standard onboarding. Shadow IT creating unmanaged third party relationships.
Threat Resistance
Addresses supply chain compromise by requiring security assessment before vendor onboarding and continuous monitoring during the relationship. Reduces fourth party concentration risk through sub-processor disclosure and dependency mapping. Ensures incident response capability through contractual notification obligations and tested playbooks. Provides financial resilience through cyber insurance verification. Enables clean exit through pre-planned data return and migration procedures.
Assumptions
The organisation uses external vendors, cloud services, and third party software. A procurement or vendor management function exists. The organisation has data classification and system criticality definitions. Regulatory requirements mandate supply chain risk management (financial services, healthcare, government, critical infrastructure).
Developing Areas
- Continuous third-party monitoring is displacing point-in-time assessment as the primary assurance mechanism, but the methodology is immature. External security rating services (BitSight, SecurityScorecard) provide observable signals but measure only internet-facing posture -- they cannot assess internal controls, incident response capability, or data handling practices. The gap between what continuous monitoring can see (exposed services, certificate hygiene, DNS configuration) and what matters (access controls, encryption, backup integrity) means ratings are directional indicators, not definitive risk measures.
- Nth-party (sub-contractor) risk visibility is the most significant blind spot in TPRM programmes. DORA and PRA SS2/21 mandate sub-processor visibility for critical ICT services, but practical enforcement is limited. Most Tier 1 vendors resist disclosing their full sub-processor chain, and the concentration risk from multiple critical vendors depending on the same cloud provider (AWS, Azure, GCP) or infrastructure service remains difficult to map and nearly impossible to mitigate without architectural diversity that increases cost and complexity.
- AI-assisted vendor risk assessment is emerging as a response to the scale problem -- hundreds of vendors requiring assessment with limited analyst capacity. LLM-powered tools can parse SOC 2 reports, extract control findings, compare against organisational requirements, and generate risk summaries, reducing initial assessment time by an estimated 60-70%. However, the accuracy of automated assessment is unvalidated at scale, and the risk of hallucinated compliance findings in AI-generated assessments creates a new category of assessment error.
- Software supply chain transparency through vendor-provided SBOMs is a regulatory requirement in progress (EU Cyber Resilience Act, US Executive Order 14028) but practical adoption is minimal. Fewer than 10% of commercial software vendors provide machine-readable SBOMs with their products, and those that do often deliver incomplete or inaccurate bills of materials. The tooling to consume, validate, and act on vendor SBOMs -- matching components to known vulnerabilities, detecting licence conflicts, verifying provenance -- is available but not integrated into standard TPRM workflows.
- Concentration risk measurement is gaining regulatory attention but lacks standardised methodology. Regulators want to know what happens if a major cloud provider or critical SaaS platform suffers a prolonged outage, but measuring concentration requires mapping dependency chains across hundreds of vendors, identifying single points of failure, and modelling correlated failure scenarios. No commercial TPRM platform provides automated concentration risk analysis, leaving organisations to build ad-hoc dependency maps that are outdated within months.
Related Patterns
Patterns that operate within or alongside this one. Click any to view.