Third-Party and Vendor Risk Management
Third-party and vendor risk management (TPRM/VRM) is the structured discipline through which organizations identify, assess, and continuously monitor the security and compliance posture of external entities that access their systems, data, or operational infrastructure. This reference covers the scope of the discipline, the frameworks that govern it, the scenarios in which it applies, and the decision thresholds that determine when formal assessment is required. TPRM operates at the intersection of cybersecurity risk management, contractual obligation, and regulatory compliance — making it a core function for any organization with an extended supply chain or outsourced service delivery model.
Definition and scope
Third-party and vendor risk management encompasses the policies, processes, and controls used to evaluate and manage the risks introduced by external organizations that have some form of access — logical, physical, or operational — to an enterprise's environment. The scope extends beyond direct software vendors to include cloud service providers, managed security service providers, payroll processors, legal firms with network access, and any fourth-party entities those vendors themselves engage.
NIST defines supply chain risk management obligations in NIST SP 800-161r1, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, which provides tiered guidance for federal agencies and organizations in their supply chains. The NIST Cybersecurity Framework (CSF) addresses vendor risk within its "Identify" function under the ID.SC subcategory, requiring organizations to identify, prioritize, and assess suppliers and third-party partners.
Regulatory mandates formalize these obligations across sectors:
- HIPAA (45 CFR §164.308(b)) requires covered entities to execute Business Associate Agreements (BAAs) with vendors that handle protected health information — see HIPAA cybersecurity requirements for full scope.
- PCI DSS v4.0 (Requirement 12.8) mandates that organizations manage the risk associated with payment card data shared with third parties — see PCI DSS reference.
- CMMC 2.0 (32 CFR Part 170) extends cybersecurity requirements to the defense industrial base supply chain, including subcontractors — see CMMC compliance reference.
- SEC cybersecurity rules (effective December 2023) require publicly traded companies to disclose material cybersecurity incidents and describe their risk management processes, including vendor oversight.
How it works
A functional TPRM program operates through a defined lifecycle, not a one-time event. The standard operational phases are:
- Vendor identification and tiering — Catalog all third parties and classify them by risk tier based on data access level, criticality to operations, and regulatory exposure. A vendor with access to personally identifiable information (PII) or payment data occupies a higher tier than a facilities contractor with no logical access.
- Pre-engagement due diligence — Before contract execution, security questionnaires (commonly aligned to the Standardized Information Gathering questionnaire, SIG, published by Shared Assessments) or SOC 2 Type II report reviews establish baseline posture.
- Contractual control requirements — Security obligations are embedded in vendor agreements, including right-to-audit clauses, breach notification timelines, data handling standards, and subprocessor restrictions.
- Ongoing monitoring — Continuous or periodic reassessment tracks changes in vendor posture. This includes reviewing updated SOC 2 reports, scanning for publicly disclosed vulnerabilities in vendor software (cross-referencing the CISA Known Exploited Vulnerabilities Catalog), and monitoring for breach disclosures.
- Offboarding and termination — At contract end, access revocation, data return or destruction, and certification of compliance are documented.
ISO/IEC 27001:2022 Annex A, Control 5.19 through 5.22, formally addresses information security in supplier relationships, covering supplier agreements, managing delivery, monitoring, and change management — see ISO 27001 overview.
Common scenarios
TPRM applies across four primary scenario categories:
SaaS and cloud provider relationships — An organization migrating workloads to a cloud platform must assess the provider's shared responsibility model, data residency practices, and incident response SLAs. Cloud security fundamentals covers the control allocation models relevant to this assessment.
Software supply chain exposure — A vendor's compromised build pipeline can introduce malicious code into enterprise environments. The 2020 SolarWinds incident, documented by CISA Alert AA20-352A, demonstrated how a single software supplier with broad enterprise deployment can function as a lateral movement vector across thousands of organizations. Supply chain security addresses the technical controls specific to this attack surface.
Managed service provider (MSP) access — MSPs often require privileged remote access, making them high-value targets. The CISA advisory AA22-131A specifically identifies MSP compromise as a threat vector requiring enhanced vendor oversight, including multi-factor authentication enforcement and privileged access management controls tied to identity and access management standards.
Fourth-party risk — An organization's direct vendor may subcontract to a party the organization has never assessed. This nested exposure requires contract clauses that flow security requirements down the supply chain, aligned to the fourth-party guidance in NIST SP 800-161r1.
Decision boundaries
The question of whether formal TPRM assessment is required — and at what depth — follows from risk tiering criteria rather than vendor category alone. The following boundaries govern assessment scope:
- Tier 1 (Critical): Vendors with direct access to production systems, regulated data (PHI, PII, PCI), or core infrastructure. Full security questionnaire, SOC 2 Type II review, and annual reassessment are standard.
- Tier 2 (High): Vendors with indirect data access or significant operational dependency. Abbreviated questionnaire and biennial formal review are typical.
- Tier 3 (Standard): Vendors with no data access and low operational criticality. Self-attestation and contractual controls may suffice.
A vendor that was correctly classified as Tier 3 at onboarding may require reclassification if scope expands — a known program failure mode that ongoing monitoring is designed to catch. The distinction between a vendor relationship and a fourth-party exposure is also a classification boundary: direct contractual control exists only one level deep, requiring explicit flow-down clauses to reach subprocessors.
TPRM programs operating in the federal space must align to OMB Circular A-130, which mandates agency-wide information security programs covering contractor-operated systems, and to FedRAMP authorization requirements for cloud services — see FedRAMP overview.
References
- NIST SP 800-161r1 — Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations
- NIST Cybersecurity Framework (CSF) — Identify Function, ID.SC Subcategory
- CISA Advisory AA20-352A — Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations
- CISA Advisory AA22-131A — Protecting Against Cyber Threats to Managed Service Providers
- CISA Known Exploited Vulnerabilities Catalog
- ISO/IEC 27001:2022 — Information Security Management Systems
- HHS — HIPAA Business Associate Guidance, 45 CFR §164.308(b)
- Shared Assessments — Standardized Information Gathering (SIG) Questionnaire
- OMB Circular A-130 — Managing Information as a Strategic Resource
- FedRAMP — Federal Risk and Authorization Management Program