- Third-Party Risk
- Risk Management
- 10th Apr 2026
- 1 min read
Third-Party Operational Risk Management
- Written by
In Short...
TLDR: 4 Key Takeaways for boards and executives
- Third-party risk is now a legal obligation, with DORA, NIS2, and FCA rules making suppliers part of your regulated risk exposure.
- Regulators expect continuous oversight, including live monitoring, due diligence, concentration risk management, and tested exit plans.
- Most programmes fall short due to manual, fragmented processes, with spreadsheets and periodic assessments no longer defensible.
- TPRM must be integrated into your wider GRC model, connecting supplier risk to operational resilience, compliance, and board reporting.
Introduction
Third-party operational risk used to sit near the bottom of most GRC agendas. A questionnaire sent annually. A box ticked. A spreadsheet updated when someone remembered.
That era is over.
Under DORA, NIS2, and FCA operational resilience rules, the risk your suppliers carry is now legally your risk. Boards are personally liable. Enforcement is active. And the gap between what most organisations have in place and what regulators now expect is significant.
This guide explains what third-party operational risk management actually requires, why the regulatory floor has risen, and what a programme fit for 2026 needs to include.
What Is Third-Party Operational Risk Management?
Third-party operational risk management (TPRM) is the discipline of identifying, assessing, monitoring, and controlling the risks that arise from an organisation's reliance on external parties — including suppliers, vendors, outsourced service providers, and technology partners — to deliver critical operations.
It differs from general vendor management in scope and intent. TPRM is focused specifically on operational exposure: what happens to your business continuity, regulatory compliance, data integrity, and service delivery if a third party fails, is compromised, or exits the relationship unexpectedly.
A mature TPRM programme covers the full lifecycle of third-party relationships — from initial due diligence before onboarding, through continuous monitoring during the relationship, to managed exit when it ends.
Why Third-Party Risk Is Now a Regulatory Obligation
DORA: ICT Third-Party Risk in Financial Services
The Digital Operational Resilience Act (DORA) came into force across EU financial services in January 2025. It places binding obligations on firms to manage ICT third-party risk — not as a best practice, but as a legal requirement.
Under DORA, financial entities must maintain a complete Register of Information (ROI) documenting all ICT third-party service providers. ROI submissions to National Competent Authorities were due in March 2026, and NCAs are now deploying automated tools to cross-reference submissions. Inconsistencies trigger enforcement automatically.
DORA also introduces concentration risk obligations: firms must understand and actively manage situations where multiple critical functions depend on a single third party or a small number of providers. Exit plans are mandatory, not optional.
Senior management is personally accountable. DORA is not a compliance exercise that can be delegated and forgotten.
NIS2: Supply Chain Risk Across Critical Infrastructure
The Network and Information Security Directive 2 (NIS2) extends cybersecurity obligations across a significantly wider range of sectors — including energy, transport, health, digital infrastructure, and manufacturing. Full compliance is required by October 2026. In Germany, registration deadlines close in April 2026.
Critically, NIS2 puts supply chain security explicitly in scope. Regulated entities must assess the cybersecurity practices of their suppliers and take appropriate risk management measures where weaknesses are identified. This is not a one-time exercise. NIS2 expects continuous oversight, not annual questionnaires.
Fines under NIS2 reach up to €10 million or 2% of global annual turnover. Management are personally liable for non-compliance.
FCA Operational Resilience: Third Parties and Critical Services
UK financial services firms face a parallel set of obligations under FCA operational resilience rules. Firms must identify important business services, set impact tolerances, and demonstrate they can remain within those tolerances even when a third party fails.
The FCA has already issued £15.7 million in fines in Q1 2026. Critical Third Party designations — applying enhanced oversight to the most systemically important service providers — are expected during 2026. Final rules on third-party outsourcing registers and incident reporting are also due this year.
Firms are now expected to evidence operational resilience, not just document it. Telling your regulator you have a plan is not sufficient if you cannot demonstrate the plan works under realistic stress scenarios.
What a Third-Party Operational Risk Management Programme Must Include
Most TPRM programmes were built for a lower-stakes environment. The following components reflect what regulators now expect.
Risk-tiered supplier classification. Not all third parties carry equal exposure. A critical ICT provider processing customer data under DORA is materially different from an office supplies vendor. Tier your suppliers based on their criticality, replaceability, data access, and regulatory relevance — and apply proportionate oversight to each tier.
Due diligence before onboarding. Risk assessment must happen before a supplier is engaged, not after the contract is signed. This includes financial stability, security posture, regulatory standing, and sub-contractor exposure (fourth-party risk). For regulated services, the assessment should be documented and retained.
Contractual obligations aligned to regulatory requirements. DORA mandates specific contractual clauses with ICT third-party providers — covering audit rights, exit assistance, security standards, incident notification, and business continuity obligations. Firms that have not reviewed legacy contracts against DORA requirements have an urgent gap to close.
Ongoing monitoring, not point-in-time assessment. Annual questionnaires do not meet the standard regulators now expect. Effective TPRM requires continuous monitoring of supplier risk — tracking changes in security posture, financial health, regulatory status, and incident history between formal review cycles.
Concentration risk management. Regulators are specifically focused on scenarios where a single failure could cascade across multiple firms or critical services. Mapping your dependencies — including where the same provider underpins multiple business services — is now a core TPRM requirement.
Exit planning. Every critical third-party relationship should have a documented exit strategy before it is needed. This includes data portability, transition timelines, interim service arrangements, and identification of alternative providers. DORA makes this explicit. Regulators treat an untested exit plan with similar scepticism to an untested business continuity plan.
Audit-ready records. Documentation, evidence of assessments, board-level reporting, and response records must be retained and accessible. When a regulator asks for evidence of your TPRM programme, "we have a spreadsheet" is not a defensible answer.
Where Most Third-Party Risk Programmes Fall Short
The gap between regulatory expectation and current practice is, for many organisations, substantial. The most common failures are structural, not superficial.
Spreadsheet-based tracking. Point-in-time data held in spreadsheets cannot support continuous monitoring, automated risk scoring, or audit-trail requirements. Manual processes introduce errors, create version control problems, and cannot scale as supply chains grow.
Inconsistent assessment depth. Without a standardised framework and tooling, the depth and quality of third-party assessments depends on who conducted them. Regulators expect consistency. Firms that cannot demonstrate it cannot demonstrate control.
No fourth-party visibility. Your critical suppliers have their own suppliers. A breach or failure at a fourth party can disrupt your operations even if your direct supplier remains intact. Most TPRM programmes have no systematic view of this exposure.
Reactive rather than continuous. Assessing a supplier at onboarding and then annually is not the same as monitoring them continuously. A supplier's risk profile can change materially between annual reviews — through a security incident, a change of ownership, a financial deterioration, or a regulatory sanction. Programmes built on periodic snapshots miss this.
Disconnected from the wider GRC estate. Third-party risk exists in isolation in many organisations — managed by procurement or a separate vendor team, disconnected from the risk register, compliance programmes, and operational resilience planning. Regulators view TPRM as integral to the GRC estate, not adjacent to it.
How Technology Supports Third-Party Operational Risk Management
Manual TPRM processes cannot meet the scale, consistency, and auditability that regulators now require. Purpose-built GRC technology closes the gap between what organisations need to evidence and what spreadsheet-based programmes can realistically deliver.
SureCloud's TPRM capability delivers 50% faster third-party risk assessments, 40% faster third-party onboarding, and 35% greater consistency across assessments — with a complete audit trail available at every stage. Third-party data is held in a single connected platform, updated in real time, and visible across risk, compliance, and operational resilience workstreams without manual re-entry.
GRACiE, SureCloud's AI, monitors the TPRM programme continuously — flagging changes, surfacing emerging risks, and generating audit-ready outputs without analyst overhead. For organisations facing DORA, NIS2, or FCA scrutiny, this is the difference between a programme that evidences control and one that documents intent.
SureCloud is recognised in the Gartner Market Guide for TPRM Solutions and has 19 years of GRC expertise embedded in the platform.
Key Takeaways
- Third-party operational risk management is a binding regulatory obligation under DORA, NIS2, and FCA operational resilience rules — not a best practice.
- Regulators expect continuous monitoring, documented due diligence, contractual alignment, concentration risk management, and tested exit plans.
- Annual questionnaires and spreadsheet-based tracking do not meet the current standard.
- Fourth-party risk (your suppliers' suppliers) is in scope and must be systematically addressed.
- Management and boards are personally liable under DORA and NIS2 for failures in third-party risk oversight.
- A connected GRC platform — not a siloed TPRM tool — is the most defensible architecture against regulatory scrutiny.
Build a Defensible Third-Party Risk Programme
FAQ’s
What is third-party operational risk?
Third-party operational risk is the exposure an organisation faces as a result of its reliance on external suppliers, vendors, or service providers to deliver critical operations. It includes the risk of service disruption, data breach, regulatory non-compliance, and reputational damage caused by a third party's failure or compromise. Under DORA and NIS2, managing this risk is a legal obligation, not an optional best practice.
What does DORA require for third-party risk management?
DORA requires EU financial entities to maintain a complete Register of Information (ROI) covering all ICT third-party service providers, conduct due diligence before engagement, include specific contractual provisions covering audit rights, security standards, exit assistance and incident notification, manage concentration risk, and maintain documented exit strategies. Senior management is personally accountable for compliance. ROI submissions were due to National Competent Authorities by March 2026.
How does NIS2 affect supply chain risk management?
NIS2 requires regulated organisations across critical infrastructure sectors to assess and manage the cybersecurity risks posed by their supply chain. This includes evaluating the security practices of direct suppliers and taking risk management measures where weaknesses are identified. Supply chain risk is not a peripheral concern under NIS2 — it is a primary compliance obligation, with fines up to €10 million or 2% of global turnover and personal management liability.
What is the difference between TPRM and vendor management?
Vendor management typically focuses on commercial performance — contract terms, SLAs, pricing, and relationship quality. Third-party operational risk management (TPRM) focuses on operational exposure — what happens to business continuity, regulatory compliance, and service delivery if a supplier fails or is compromised. TPRM includes security assessments, concentration risk analysis, exit planning, and continuous monitoring that vendor management programmes do not typically cover.
What is fourth-party risk?
Fourth-party risk refers to the exposure arising from your suppliers' own suppliers and service providers. Even if your direct supplier is sound, a failure at one of their critical dependencies can disrupt the service they provide to you. Regulators increasingly expect organisations to understand and account for fourth-party exposure, particularly in critical ICT supply chains.
“In SureCloud, we’re delighted to have a partner that shares in our values and vision.”
Read more on how Mollie achieved a data-driven approach to risk and compliance with SureCloud.
“In SureCloud, we’re delighted to have a partner that shares in our values and vision.”
Read more on how Mollie achieved a data-driven approach to risk and compliance with SureCloud.
“In SureCloud, we’re delighted to have a partner that shares in our values and vision.”
Read more on how Mollie achieved a data-driven approach to risk and compliance with SureCloud.
Platform +
Frameworks +
Products +
Industries +
Resources +
Company +
London Office
1 Sherwood Street, London, W1F 7BL, United Kingdom
US Headquarters
6010 W. Spring Creek Pkwy., Plano, TX 75024, United States of America
© SureCloud 2026. All rights reserved.