Why third-party risk management matters: the supply chain threat
Building a vendor tiering and risk assessment framework
Ongoing monitoring and managing vendor risk posture
Key Takeaways
TL;DR
Supply chain attacks (SolarWinds, Kaseya, MOVEit) demonstrate that vendor compromises cascade directly into your environment — TPRM is essential, not optional.
Vendor tiering (Critical, Significant, Low) ensures assessment depth matches actual risk — not every vendor needs SIG Full.
Point-in-time assessments are insufficient; continuous monitoring with tools like CDA provides ongoing visibility into vendor security posture changes.
Contractual mechanisms (security requirements, breach notification, right-to-audit) provide enforcement authority for your TPRM program.
CDA's vendor monitoring feature enables automated, recurring scans against your vendor portfolio with alerts for security posture degradation.
FAQ
Frequently asked questions
How many vendors should we assess in our TPRM program?
Focus assessment depth on risk, not volume. Conduct comprehensive assessments (SIG Full or equivalent) for all Tier 1 critical vendors — typically 5 to 15 for most SMBs. Use standardized questionnaires (SIG Lite) for Tier 2 significant vendors — typically 15 to 40. Perform basic due diligence for all remaining vendors. Most SMBs have 50 to 200 total vendor relationships, but only 5 to 15 require deep assessment. Running CDA scans across your full vendor portfolio provides baseline visibility without the overhead of formal questionnaires for every relationship.
What should we do if a critical vendor fails our security assessment?
A failed assessment does not automatically mean termination. The appropriate response depends on the severity of gaps and the vendor's willingness to remediate. For identified gaps, request a formal remediation plan with specific timelines. For critical deficiencies (no encryption, no incident response capability, major unpatched vulnerabilities), consider whether compensating controls on your side can mitigate the risk while the vendor remediates. If the vendor refuses to remediate or the risk is unacceptable, begin transition planning to an alternative provider. Document all decisions and rationale for compliance evidence.
Do we need a dedicated TPRM team?
Most SMBs do not need a dedicated TPRM team, but they do need a defined TPRM process with clear ownership. Assign TPRM responsibility to your Qualified Individual (for FTC compliance), CISO, IT director, or compliance officer. Use automation tools like Cyber Defense Agent to handle continuous monitoring and questionnaire processing, which reduces the human effort required. For most SMBs with 50 to 200 vendors, a single person spending 4 to 8 hours per week on TPRM — supported by automation — can maintain an effective program.
Get your Cyber Defense Score™ in 60 seconds.
100 tools. No installation. No credit card. Real evidence.