How to Perform a Third-Party Risk Assessment in 2024

Edward Kost

A Third-Party risk assessment is a critical component of a Third-Party Risk Management program. Without understanding how to properly execute these assessments, the efficiency of your TPRM program will remain limited.

This post provides a detailed six-step guide for performing third-party risk assessments in cybersecurity.

Where does a third-party risk assessment fit in the TPRM lifecycle?

Third-party risk assessments uncover potential security risks from third-party vendors and external parties. This critical requirement continues throughout the entire TPRM lifecycle, with varying applicability across its three primary stages:

  1. Vendor Onboarding: A high-level third-party risk assessment is conducted at the onboarding stage, with the primary objective of determining whether a new vendor’s risk profile fits within the company’s defined third-party risk appetite.
  2. Ongoing Monitoring: Once onboarded, third-party vendors undergo periodic vendor risk assessments to track regulatory compliance efforts and ensure new risks are promptly detected and managed throughout each vendor lifecycle. Critical vendors, those processing highly sensitive internal data, undergo the most detailed degree of vendor assessments during the ongoing monitoring phase.
  3. Offboarding: Third-party risk assessments uncover residual supplier risks of terminating vendor relationships. They are also helpful for finding new cyber risks when renewing

Critical third-party vendors must be prioritized in risk assessment programs since their potential cybersecurity risks are more likely to be exploited in cyber attacks.

Full risk assessment vs. partial risk assessment

The scope of a third-party risk assessment depends on the level of criticality of the third-party vendor being investigated. For example, third parties requiring access to sensitive data or those integral to supporting your promised service levels to clients must undergo a higher degree of attack vector investigation.

Such third-party vendors (classified as “Critical” or “High-Risk” in a Vendor Risk Management program) require a full risk assessment, one involving security questionnaires mapping to applicable cybersecurity standards.

For all remaining third-party vendors not requiring access to sensitive regions of your IT ecosystem - those classified as “low-risk” - ongoing monitoring of automated attack surface scanning results will likely be a sufficient form of a risk assessment, also known as a partial risk assessment.

Full risk assessments apply to high-risk vendors and involve security questionnaires. Partial risk assessments apply to low-risk vendors with a degree of risk exposure that can be sufficiently tracked with automated risk scanning results.

Difference between a third-party risk assessment and a security questionnaire

A third-party risk assessment comprehensively evaluates the potential risks associated with each third-party vendor. Multiple data sources are referenced to form a complete picture of a vendor’s risk profile through a risk assessment.

A third-party risk assessment gathers risk insights across the following risk categories:

  1. Operational Risk: The level of risk a third-party vendor poses to the availability of an organization’s operations.
  2. Cybersecurity Risk: Any third-party risk impacting the safety and integrity of an organization’s sensitive data.
  3. Compliance Risk: Vendor-related risks threatening alignment with regulatory standards.
  4. Financial Risk: Risks originating from vendors that could result in financial issues. These could stem from third-party operational risks and even data breach risks, which could have significant financial consequences—an impact that could be estimated through a process known as Cyber Risk Quantification.
  5. Reputational Risk: Any threats of reputational damage due to vendor behavior, such as questionable leadership decisions and data breaches.
  6. Geographic Risk: Any risks associated with a vendor’s location or the location of their data servers.

Security questionnaires are a specific tool within the risk assessment process. They are used to create a gap analysis between a vendor’s security posture and any regulatory requirements or cybersecurity frameworks they need to align with.

Some popular industry standards security questionnaires could map to include:

For more questionnaire template examples, see the list of questionnaires available on the UpGuard platform.

Third-party risk assessments are broad and comprehensive, covering multiple dimensions of risk. Security questionnaires collect information about specific security practices and regulatory compliance efforts.

6-step guide to completing third-party risk assessments

The following six-step guide will help you design the most comprehensive third-party risk assessment process.

Step 1: Identify your “critical” third-party vendors

Every third-party risk assessment process must prioritize critical third-party vendors. Ideally, these vendors should have been already flagged as critical during onboarding.

If you haven’t yet segregated your critical third-party vendors, there are two primary methods of identifying them: relationship questionnaires and superficial attack surface scanning. Both methods encompass the risk assessment process undertaken during the onboarding stage of the TPRM workflow.

Relationshp questionnarie

A relationship questionnaire gathers high-level intelligence about a vendor’s services, data security, and data handling practices.

Here’s a very simplified example of some of the information a relationship questionnaire could cover: