Skip to main content
CybersecurityPDF · 1 pages · 27 KBPublished March 2026

Third-Party Risk Management Checklist

30% of breaches now involve a vendor. Annual questionnaires are not enough. If you still evaluate vendor risk once a year with a spreadsheet, your program has a gap attackers have already found. This checklist covers the 8 controls for real-time third-party risk management: critical vendor mapping, continuous monitoring, least-privilege access, vendor compromise in your IR plan, contract security terms, fourth-party risk assessment, automated security ratings, and vendor offboarding procedures.

What's Inside

  • 8-point third-party risk management program checklist
  • Continuous monitoring replacing annual questionnaires
  • Fourth-party (vendor's vendor) risk assessment requirements
  • Vendor offboarding process to remove all access promptly

Enter your details to download this resource for free.