ELI5: What is Third-Party Risk?

Say you give your house key to a dog walker so they can come in while you’re at school. You trust them, but what if they lose the key or leave the door unlocked? Third-party risk is the danger that comes from sharing your stuff (data, systems, or access) with outside helpers like vendors or partners. If their security is weak, bad guys could get to your data through them — even if your own locks are strong.

Overview

Third-party risk arises whenever an organization shares data, systems, or access with external entities such as vendors, contractors, cloud providers, or business partners. A compromise at a third party can directly impact your organization. Managing this risk requires due diligence before onboarding, continuous monitoring during the relationship, and secure offboarding at termination.

Key Concepts

  • Supply chain risk — compromised hardware, software, or services introduced through the supply chain (e.g., SolarWinds)
  • Vendor assessment — questionnaires, on-site audits, penetration test results, and SOC reports used to evaluate vendor security
  • Service Level Agreements (SLAs) — contractual terms defining uptime, response times, and security obligations
  • Right to audit — contractual clause allowing the organization to audit the vendor’s security controls
  • Data ownership and processing agreements — clearly define who owns data and how it is handled, stored, and deleted
  • SOC reports — SOC 2 Type I (point-in-time) and Type II (over a period) attest to a service provider’s controls
  • Vendor lock-in — dependency risk when switching providers is costly or technically difficult
  • Offboarding — revoking access, retrieving data, and ensuring secure data destruction when a vendor relationship ends
  • Fourth-party risk — risk from your vendor’s vendors; you may not have visibility into their supply chain
  • MOU (Memorandum of Understanding) — less formal agreement outlining mutual intentions between parties
  • MSA (Master Service Agreement) — overarching contract governing all future transactions between parties
  • BPA (Business Partners Agreement) — defines responsibilities and profit/loss sharing between business partners

Exam Tips

Remember

SOC 2 Type II is more valuable than Type I because it covers a time period, not just a snapshot. The exam tests supply chain attacks and vendor assessment methods frequently.

Connections

  • Falls under the broader risk-management framework as a specific category of external risk
  • Related to compliance because regulations often require organizations to ensure third-party data handling meets standards
  • See also security-policies for acceptable use and vendor management policy requirements

Practice Questions

Scenario

See case-third-party-risk for a practical DevOps scenario applying these concepts.