With third-party data breaches and their subsequent financial impacts on the rise, Third-Party Risk Management is becoming a non-negotiable inclusion in an organization’s cybersecurity strategy. For those new to this risk management area, this post outlines a high-level framework for applying TPRM principles to a third-party risk context.
Learn how UpGuard streamlines Vendor Risk Management >
Scenario overview:
Learn how UpGuard helps financial services mitigate data breach risks >
Note: The following is a high-level application of a Third-Party Risk Management program for this financial risk scenario. For a more in-depth example of how to apply TPRM to your unique third-party risk exposure context, request a free trial of UpGuard.
Before all potential risks associated with the third-party vendor are officially evaluated with a risk assessment, it’s helpful to narrow the scope of potential risk categories the vendor is exposed to. From the threat scenario, the following categories of TPRM risks should be considered in a risk analysis:
Next, the TPRM team should perform a high-level risk analysis for the vendor, addressing all the risk categories listed in the previous step. This effort has two objectives:
There are three primary sources of third-party risk data sources that collectively offer the most efficient means of building a preliminary third-party risk profile for new vendors:
With so many potential pathways to third-party cybersecurity data sources, gathering inherent risk data to produce superficial vendor security posture profiles can quickly become convoluted and difficult to manage. To prevent this, this phase of the TPRM lifecycle, referred to as “Evidence Gathering,” is best completed with a platform streamlining the exchange of security information across third-party relationships, such as Trust Exchange by UpGuard - available to everyone for free.
Get started with Trust Exchange for free >
To make the entire third-party risk management process efficient and scalable, all onboard third-party vendors should be ranked by degree of criticality based on the security posture insights gathered in the previous step. This will allow high-risk vendors - those with the greatest potential negative impact on your organization - to be readily prioritized in risk assessment efforts.
The fact that the financial entity is outsourcing sensitive data processing to this vendor should be an immediate trigger a critical classification for the vendor in a TPRM program. For more information about tiering methodologies, refer to this post explaining the vendor tiering process.

With AWS classified as a critical third-party vendor, the financial service should evaluate it with the most comprehensive level of risk assessment – a full risk assessment. Full third-party risk assessments are typically characterized by the inclusion of security questionnaires in addition to automated risk detection methodologies, such as attack surface scans and security ratings.

Related: How to implement a vendor risk assessment process.
The following questionnaire types would map to all of the major risk categories that are relevant in this third-party risk management context:

Custom security questionnaire builder on the UpGuard platform.
Watch this video for a more in-depth overview of the third-party risk assessment process.
The results from the completed risk assessment should provide a high-level framework for ongoing risk mitigation for the duration of the vendor relationship. At this point of the TPRM lifecycle, this risk mitigation framework could be shared with stakeholders who want to be involved in developing the framework into a strategic risk mitigation action plan, which would be expected if your IT ecosystem is aligned with NIST CSF 2.0.

Remediation plans should prioritize critical risks before all other types of third-party risk to maintain the lowest potential for a third-party breach to occur before all dangerous attack vectors have been addressed.
With this vendor having a history of security exploits, for enhanced data protection, the vendor’s fourth-party vendors should also be monitored as part of a fourth-party risk management strategy.

Managing remediation tasks can get very overwhelming with a vast third-party vendor network. To vendor management efficiency and scalable risk assessment processes, all remediation efforts should be managed in a TPRM solution specifically designed to streamline a high volume of remediation workflows, not spreadsheets.

To appreciate the operational benefits of upgrading from manual-based risk assessment processes, learn how UpGuard helped OVO build a scalable Vendor Risk Management program.
After addressing detected third-party risks, the vendor will need to undergo continuous monitoring to track any emerging threats impacting all of its applicable risk categories. For the most ongoing monitoring strategy, point-in-time risk assessment should be combined with real-time attack surface monitoring technology, such as security ratings. This will empower security to maintain complete visibility of emerging risks, even between assessment schedules.


Continuous monitoring technology, as part of a broader Attack Surface Management program, could also extend risk detection capabilities to the offboarding phase of the vendor lifecycle, identifying third-party access points that should be removed when third-party relationships expire.
If you’re unfamiliar with the concept of Attack Surface Management, watch this video for an introductory overview: