Academy

Module 4 Β· Third-Party Risk Management πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 22, 2026
5 min read

Third-party risk management (TPRM) is the discipline of identifying, assessing, and continuously monitoring the security risks introduced by your vendors and partners. Most modern breaches involve a third party β€” either as the source of compromise or as the path to it. This module covers the operating model, assessment workflow, ongoing monitoring, and the contractual provisions that matter.

Why TPRM is hard

  • You don’t control vendor systems β€” only your relationship with them
  • Vendors range from huge (AWS, Azure) to tiny (a 3-person SaaS that does one critical thing)
  • One-time assessments age quickly; vendor security posture changes
  • The risk is often invisible β€” you cannot see your vendor’s controls daily
  • Regulatory expectations are rising fast (DPDP, EU DORA, RBI third-party risk guidance)

Vendor classification β€” tier by inherent risk

Not every vendor needs the same scrutiny. Tier vendors by:

  • Data sensitivity: do they hold our customer data? PII? Financial? Source code?
  • Access level: direct system access? Reads only? Privileged?
  • Operational dependence: would loss of this vendor halt our business?
  • Regulatory implications: are they subject to obligations we’re then liable for?

A common 3-tier model:

πŸ” Intermediate Module Β· Basic Tier

Continue reading with Basic tier (β‚Ή499/month)

You've read 27% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.

99+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
5 more sections locked below