How to assess vendors, manage ongoing third-party risk, and build a TPRM program that satisfies auditors without consuming your team.
Your security posture is only as strong as your weakest vendor. If a third party has access to your systems or data and they get breached, you get breached — regardless of how good your own controls are.
Third-party incidents account for a significant and growing proportion of data breaches. The attack surface isn’t just your perimeter; it’s every SaaS tool, every contractor, every API integration.
A mature TPRM program follows a consistent lifecycle for every vendor:
1. Identification and Tiering Not all vendors carry equal risk. A SaaS tool with read-only access to non-sensitive data is very different from a managed service provider with admin access to your production environment.
Tier your vendors by risk — typically Critical, High, Medium, Low — based on:
2. Initial Assessment Before onboarding a vendor, assess their security posture. For critical and high-tier vendors this typically means:
3. Contracting Security requirements should be embedded in contracts — not bolted on afterwards. Key clauses:
4. Ongoing Monitoring One-time assessments go stale. Ongoing monitoring should include:
5. Offboarding When a vendor relationship ends, don’t leave data behind. Confirm deletion, revoke access, and document the offboarding.
Security questionnaires are the backbone of most TPRM programs — and also the biggest source of pain. Vendors hate receiving them; your team hates sending and reviewing them.
A few ways to make it manageable:
If you’re going through ISO 27001 or SOC 2, auditors will look for evidence of a functioning TPRM program:
The most common gap: organisations have onboarding assessments but no evidence of ongoing monitoring. Point-in-time is not enough.