All services
GRC

Third-Party & Vendor Risk Assessment

Your supply chain is part of your attack surface.

Stand up or scale a third-party risk program — vendor tiering, security due diligence, continuous monitoring, and contract-grade evidence aligned to ISO 27036, NIST SP 800-161, and DORA.

Overview

What this covers.

Most breaches now arrive through someone else's network. We design and operate vendor risk programs that scale with your procurement velocity: risk-tiered onboarding, evidence-based assessments, and continuous monitoring of the few vendors that materially affect your operations or compliance.

Coverage

What we test.

Comprehensive coverage across the categories that matter — combined manual and tool-assisted testing.

01

Vendor Inventory

Consolidated vendor list with data flow, criticality, and access mapping.

02

Risk Tiering

Tier 1–4 model based on data sensitivity, business impact, and access depth.

03

Due Diligence

Questionnaires, evidence review (SOC 2, ISO 27001, pen test reports, BCP).

04

Technical Validation

External posture review and targeted technical checks for tier-1 vendors.

05

Continuous Monitoring

Breach alerts, certificate expiry, external attack-surface drift, sanctions hits.

06

Contract & Exit

Security and exit-clause review; right-to-audit, breach notification, sub-processor controls.

Methodology

How we run it.

A repeatable, well-documented process so your team always knows what's coming next.

01
Inventory

Discover and consolidate vendors; map data, access, and dependencies.

02
Tier

Risk-rank using a defensible tiering model tied to business impact.

03
Assess

Right-sized due diligence per tier — evidence > questionnaires.

04
Monitor

Continuous signals on critical vendors; quarterly reviews on the rest.

05
Govern

Findings remediation, contract enforcement, exit readiness.

Deliverables

What you receive.

  • Vendor inventory and tiering model
  • Due-diligence questionnaire pack and review
  • Per-vendor risk reports with remediation actions
  • Continuous monitoring dashboard
  • Contract and exit-clause review
  • Annual program report for the board
Compliance

Standards we map to.

ISO 27036NIST SP 800-161DORA (EU)RBI Outsourcing GuidelinesSOC 2 CC9.2
FAQ

Frequently asked.

Do you operate the program or just set it up?+

Both. We can build the program and hand it over, or run it as a managed service with monthly intake and reporting.

Do you integrate with our procurement / GRC tool?+

Yes — including OneTrust, ServiceNow, Archer, LogicGate, Vanta, Drata, Hyperproof, and SecurityScorecard.

Start your vendor risk

Tell us about your scope and goals. We'll come back with a proposal within 48 hours.