Attackers increasingly exploit vendor relationships to scale their reach, one compromised supplier can impact multiple organisations. Regulators and insurers are moving away from annual questionnaires toward continuous, real-time oversight.
Every supplier with system or data access is a potential threat vector. The ENISA Threat Landscape 2024 identifies supply chain attacks as one of the EU’s top seven threats, emphasising their growing prevalence.
Key regulatory mandates:
Cyber insurance expectations:
Underwriters now demand evidence of continuous vendor monitoring, strong access controls, documented TPRM processes, contingency planning, and aggregation risk assessments.
Actions:
Tip: Maintain a mapping of suppliers to their data/system access via identity groups (e.g., Azure AD, Okta) to support rapid offboarding and GDPR Art. 28 compliance.
Assess vendors using clear criteria:
Risk tiers: High / Medium / Low based on data sensitivity, system importance, threat exposure, and vendor control maturity.
Create an Impact × Likelihood matrix for vendor risk:
Tooling:
Apply due diligence based on risk tier:
High-risk vendors: Require SOC 2 Type II or ISO 27001 certificate + Statement of Applicability; UK/EU GDPR Art. 28 DPA; sub-processor notifications; secure SDLC; pen-test reports; MFA/SSO; incident response SLAs.
PCI TPSPs: Obtain current PCI DSS AOC/ROC and evidence of compliance with Req. 12.8 oversight.
DORA ICT providers: Contracts must include audit rights, exit clauses, incident notification, register data, and service location details.
Personal data processors: Enforce Art. 28 clauses: confidentiality, TOMs (Art. 32), assistance with data subject rights, data return or deletion, sub-processor approvals, audit rights.
Insurer context: Continuous evidence of due diligence, not just paperwork, is essential for coverage and claims