Third-Party Risk Management
Definition
Third-Party Risk Management is the process of identifying, assessing, controlling, and monitoring risks introduced by external parties such as suppliers, service providers, contractors, distributors, and business partners. It covers the broader risk relationship with nonemployees, including operational, regulatory, cyber, financial, and reputational exposure.
What is Third-Party Risk Management?
Third-Party Risk Management examines the risks created when an organization depends on outside entities to provide goods, services, data processing, logistics, technology, or market access. The discipline is broader than conventional procurement risk because the third party may create exposure even when spend is low, for example by accessing sensitive systems, handling regulated data, interacting with customers, or operating in a heavily controlled market.
It works by classifying the third party’s role, assessing inherent risk, performing due diligence, setting approval conditions, and applying monitoring and control measures during the life of the relationship. Depending on the risk profile, this may involve cybersecurity review, financial analysis, sanctions screening, privacy assessment, business continuity review, subcontractor disclosure, or contractual control requirements.
Third-Party Risk Management is used by procurement, compliance, legal, privacy, information security, finance, and operational risk teams because third-party exposure cuts across multiple control domains.
Risk Domains in Third-Party Relationships
Common risk domains include cybersecurity, data privacy, financial stability, operational resilience, legal compliance, anti-bribery, sanctions exposure, concentration risk, and reputational risk. The importance of each domain depends on what the third party does. A software provider with customer data access creates different exposure from a facilities maintenance contractor or a physical goods supplier.
This domain approach is important because it prevents a one-size-fits-all review. Effective TPRM applies deeper scrutiny where the relationship creates material exposure and lighter controls where the role is limited.
The Third-Party Risk Lifecycle
The lifecycle usually begins before onboarding, when the organization determines whether the third party is acceptable for the intended role. After approval, the relationship is monitored through control attestations, performance data, incident review, contract milestones, and periodic reassessment. If the third party’s services, access level, geography, or ownership changes, risk may need to be reassessed before the relationship continues under the new conditions.
Exit controls matter as well. Offboarding may require return or deletion of data, removal of system access, transfer of records, settlement of obligations, and contingency arrangements if the third party provided a critical service.
Controls Used in TPRM
TPRM controls commonly include risk-based questionnaires, audits, security testing, insurance requirements, rights to inspect, incident notification clauses, subcontractor restrictions, service continuity obligations, and termination rights. These controls are not substitutes for judgment. They are mechanisms for turning risk conclusions into enforceable operating expectations.
Third-Party Risk Management vs Supplier Risk Management
Supplier Risk Management focuses on suppliers in the procurement context, especially those providing goods or services. Third-Party Risk Management is broader and includes vendors, contractors, outsourced processors, distributors, and other external entities whose activities may create noncommercial risk. Supplier risk is therefore one subset of the broader third-party risk landscape.
Frequently Asked Questions about Third-Party Risk Management
Why is Third-Party Risk Management broader than a procurement review?
Procurement reviews often emphasize commercial suitability, contract terms, price, and delivery capability. Third-Party Risk Management adds other exposure domains such as cybersecurity, privacy, sanctions, business continuity, and regulatory obligations. A third party may represent high risk even when spend is modest if it accesses systems, processes sensitive data, or performs a controlled function. TPRM therefore requires cross-functional evaluation rather than commercial assessment alone.
What determines how much due diligence a third party should receive?
The depth of due diligence should be based on inherent risk. Relevant factors include the type of service or product provided, criticality to operations, data access, regulatory exposure, geographic footprint, subcontracting model, and ease of replacement. Risk-based due diligence allows the organization to focus deeper review where failure would have serious consequences instead of burdening every third party with the same level of assessment.
Can a low-spend third party still be high risk?
Yes. Spend value is not a reliable proxy for risk. A small software vendor with privileged system access, a consultant handling confidential data, or a niche specialist supporting a critical regulated process may create more exposure than a high-spend provider of standardized low-risk goods. TPRM looks at the nature of the relationship and the consequences of failure, not only the amount paid.
Why is ongoing monitoring important in TPRM?
Risk conditions change during the relationship. A provider’s financial health may weaken, a cyber incident may occur, ownership may change, a subcontractor may be introduced, or the service scope may expand into a more sensitive area. If monitoring stops after onboarding, the organization is managing yesterday’s risk picture rather than today’s. Ongoing monitoring keeps controls aligned with current exposure.
« Back to Glossary Index