Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1144

Third-Party Risk Management (TPRM)

What is Third-Party Risk Management (TPRM)?

Third-Party Risk Management (TPRM)The end-to-end discipline of identifying, assessing, contracting, monitoring, and offboarding third parties so that the cyber, operational, and compliance risks they introduce stay within appetite.


TPRM covers every relationship in which an organization relies on an external party - vendors, service providers, cloud platforms, fintech partners, n-th party suppliers - to deliver business outcomes. A typical TPRM lifecycle includes inherent risk tiering, due diligence (security questionnaires, SOC 2, ISO 27001, on-site audits), contractual safeguards (right-to-audit, breach notification, data clauses), continuous monitoring (ratings, threat intel, attestations), incident handling, and offboarding. Regulators in finance (DORA, OCC, FFIEC), healthcare (HIPAA), and privacy (GDPR) impose increasingly prescriptive TPRM expectations. Modern programs integrate TPRM with ERM, procurement, legal, and cyber operations and pay special attention to concentration and supply-chain risk.

Examples

  1. 01

    Tiered TPRM program with stricter due diligence for vendors handling regulated data.

  2. 02

    Continuous monitoring via security ratings and SOC reports of critical SaaS providers.

Frequently asked questions

What is Third-Party Risk Management (TPRM)?

The end-to-end discipline of identifying, assessing, contracting, monitoring, and offboarding third parties so that the cyber, operational, and compliance risks they introduce stay within appetite. It belongs to the Compliance & Frameworks category of cybersecurity.

What does Third-Party Risk Management (TPRM) mean?

The end-to-end discipline of identifying, assessing, contracting, monitoring, and offboarding third parties so that the cyber, operational, and compliance risks they introduce stay within appetite.

How does Third-Party Risk Management (TPRM) work?

TPRM covers every relationship in which an organization relies on an external party - vendors, service providers, cloud platforms, fintech partners, n-th party suppliers - to deliver business outcomes. A typical TPRM lifecycle includes inherent risk tiering, due diligence (security questionnaires, SOC 2, ISO 27001, on-site audits), contractual safeguards (right-to-audit, breach notification, data clauses), continuous monitoring (ratings, threat intel, attestations), incident handling, and offboarding. Regulators in finance (DORA, OCC, FFIEC), healthcare (HIPAA), and privacy (GDPR) impose increasingly prescriptive TPRM expectations. Modern programs integrate TPRM with ERM, procurement, legal, and cyber operations and pay special attention to concentration and supply-chain risk.

How do you defend against Third-Party Risk Management (TPRM)?

Defences for Third-Party Risk Management (TPRM) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Third-Party Risk Management (TPRM)?

Common alternative names include: TPRM, Third-party cyber risk.

Related terms

See also