سامي
سامي الغامدي
مستشار Fyntralink · متاح الآن
مدعوم بالذكاء الاصطناعي · Fyntralink

Lesson 36: Third-Party Risk Management — Securing Your Vendor Ecosystem

Security Leadership Path — Lesson 6 of 10. Build a robust Third-Party Risk Management program that satisfies SAMA CSCC and NCA ECC requirements while protecting your organization from vendor-introduced threats.

F
FyntraLink Team
Security Leadership Lesson 6 of 10 Level: Advanced Reading time: 12 minutes

What You Will Learn in This Lesson

  • Why third-party vendors are the most underestimated attack surface in Saudi financial institutions
  • How to build a structured Third-Party Risk Management (TPRM) program from assessment to continuous monitoring
  • Practical techniques for vendor tiering, due diligence questionnaires, and contractual security clauses
  • How SAMA CSCC and NCA ECC specifically address outsourcing and third-party risk — and what auditors look for

The Vendor Blind Spot: Why Your Security Perimeter Includes Others

How many vendors have remote access to your production systems right now? If you cannot answer that question with a specific number, you have a third-party risk problem. In Saudi financial institutions, the average organization relies on 40 to 80 third-party technology providers — from core banking platforms and payment processors to cloud hosting, HR systems, and even physical security contractors. Each one of these vendors represents a potential entry point for attackers, and a single compromised vendor can cascade into a breach that impacts every client they serve.

The 2020 SolarWinds attack demonstrated this at a global scale: one compromised software update infected 18,000 organizations simultaneously. Closer to the Saudi financial sector, think about the shared managed-service providers that handle IT operations for multiple banks and insurance companies in the region. A breach at one MSP could expose the data and systems of a dozen regulated entities at once. Third-Party Risk Management (TPRM) is not an optional program — it is a core pillar of your security architecture.

Building a TPRM Program: The Five-Phase Lifecycle

An effective TPRM program follows a lifecycle that begins before you sign a vendor contract and continues until the relationship ends. Think of it as five distinct phases, each with its own activities, stakeholders, and deliverables.

Phase 1: Vendor Inventory and Tiering

You cannot protect what you do not know about. Start by building a comprehensive vendor inventory. Work with procurement, IT, and business units to catalog every third party that touches your data, systems, or facilities. For each vendor, record: the type of data they access, whether they have network connectivity to your environment, the business process they support, and who internally owns the relationship.

Once cataloged, assign each vendor a risk tier. A practical three-tier model works well:

Practical Example: A Saudi bank classifies its core banking platform provider (Tier 1 — Critical) because it processes all customer transactions and holds PII. The office supplies vendor (Tier 3 — Low) has no system access. A marketing analytics firm that receives anonymized transaction data (Tier 2 — Significant) sits in between. Each tier triggers a different depth of due diligence: Tier 1 gets a full on-site assessment annually, Tier 2 gets a questionnaire plus evidence review, and Tier 3 gets a self-attestation form.

Phase 2: Due Diligence and Risk Assessment

Due diligence is where you evaluate a vendor's security posture before granting access and periodically thereafter. For Tier 1 vendors, this should include: reviewing their latest SOC 2 Type II or ISO 27001 certificate, sending a detailed security questionnaire covering access controls, encryption, incident response, and business continuity, conducting a technical assessment or penetration test of the integration points, and verifying their compliance with regulations that apply to your sector (PCI-DSS for payment processors, PDPL for data processors).

A common mistake is treating due diligence as a checkbox exercise. The questionnaire is only useful if someone with security expertise actually reviews the answers, follows up on gaps, and documents accepted risks. Build a scoring matrix that maps questionnaire responses to risk ratings, and define clear thresholds for acceptance, conditional approval, or rejection.

Phase 3: Contractual Controls

Your contract is your enforcement mechanism. Every vendor agreement should include security-specific clauses that give you the right to audit, mandate breach notification timelines, define data handling requirements, and specify termination conditions for security failures. Key clauses to include:

ESSENTIAL VENDOR SECURITY CLAUSES:

1. Right to Audit: "The Institution reserves the right to conduct 
   security audits of the Service Provider's facilities, systems, 
   and processes with 30 days written notice."

2. Breach Notification: "Service Provider shall notify the Institution 
   of any confirmed or suspected security incident within 24 hours 
   of detection."

3. Data Handling: "All Institution data shall be encrypted at rest 
   (AES-256) and in transit (TLS 1.2+). Data shall not be stored 
   or processed outside the Kingdom of Saudi Arabia without prior 
   written consent."

4. Subcontracting: "Service Provider shall not subcontract any 
   portion of the services involving Institution data without 
   prior written approval."

5. Termination & Data Return: "Upon termination, Service Provider 
   shall return or securely destroy all Institution data within 
   30 days and provide a certificate of destruction."

Phase 4: Continuous Monitoring

A vendor that was secure when you signed the contract may not be secure twelve months later. Continuous monitoring bridges the gap between periodic assessments. Practical monitoring activities include: subscribing to threat intelligence feeds that track vendor breaches, using external attack surface management (EASM) tools like SecurityScorecard or BitSight to monitor vendor security ratings, reviewing vendor SOC reports annually, tracking vendor access logs in your SIEM for anomalous behavior, and requiring vendors to notify you of material changes to their security posture (new subprocessors, infrastructure migrations, leadership changes).

Phase 5: Offboarding and Access Termination

When a vendor relationship ends, the risk does not automatically disappear. Create a formal offboarding checklist: revoke all credentials and VPN access within 24 hours, confirm data return or destruction with documented evidence, remove firewall rules and network segments, update your vendor inventory, and conduct a final review of any residual data the vendor may still hold. Many organizations forget this step, leaving dormant vendor accounts that attackers can discover and exploit months later.

Vendor Risk Assessment in Practice: A Scoring Framework

Abstract risk ratings are not actionable. Use a quantitative scoring approach that your team can apply consistently. Here is a framework that maps well to SAMA expectations:

VENDOR RISK SCORING MATRIX:

Category                    Weight    Score (1-5)
─────────────────────────────────────────────────
Data Sensitivity             25%      [Rate based on data classification]
System Access Level          20%      [Network, API, physical, none]
Regulatory Impact            15%      [SAMA-regulated service? PCI scope?]
Business Criticality         15%      [RTO impact if vendor fails]
Security Maturity            15%      [Based on due diligence findings]
Geographic Risk              10%      [Data residency, jurisdiction]

Total Weighted Score → Risk Tier:
  4.0 - 5.0  →  Tier 1 (Critical)   → Full assessment + annual audit
  2.5 - 3.9  →  Tier 2 (Significant) → Questionnaire + evidence review
  1.0 - 2.4  →  Tier 3 (Low)         → Self-attestation + periodic check
Practical Example: A Saudi insurance company evaluates a new claims processing SaaS vendor. Data Sensitivity scores 5 (customer PII and medical records), System Access scores 4 (API integration with core systems), Regulatory Impact scores 4 (SAMA-regulated, PDPL-applicable), Business Criticality scores 4 (claims cannot be processed without it), Security Maturity scores 3 (ISO 27001 certified but no SOC 2), Geographic Risk scores 2 (data hosted in Saudi region). Weighted total: 3.85 — Tier 2, trending toward Tier 1. The CISO decides to treat this as Tier 1 given the data sensitivity, requiring a full on-site assessment before contract signing.

Connecting TPRM to the Saudi Regulatory Landscape

Third-party risk is not buried in a footnote of Saudi regulations — it is front and center. SAMA's Cyber Security Framework (CSCC) dedicates an entire domain to outsourcing security. Domain 5 (Third-Party Cybersecurity) requires regulated entities to maintain a register of all third-party service providers, conduct risk assessments proportional to the criticality of outsourced services, include cybersecurity requirements in all outsourcing contracts, and monitor third-party compliance on an ongoing basis. NCA's Essential Cybersecurity Controls (ECC) mirror this through controls in the Third-Party and Cloud Computing Cybersecurity subdomain, emphasizing that organizations remain accountable for security even when services are outsourced. During SAMA audits, examiners routinely ask for your vendor register, sample due diligence reports, and evidence that contract clauses align with framework requirements. Having a well-documented TPRM program is not just good security — it is a compliance imperative.

Common Mistakes to Avoid

  • Treating all vendors the same: Applying the same lightweight questionnaire to your core banking provider and your cleaning service wastes resources on low-risk vendors while under-assessing critical ones. Use tiering to allocate effort proportionally to risk.
  • Assessing once and forgetting: A vendor assessment is a snapshot in time. Without continuous monitoring and periodic reassessment, you miss changes in a vendor's security posture, ownership, or infrastructure that could introduce new risks. Set calendar reminders for annual reassessments of Tier 1 and Tier 2 vendors.
  • Skipping the offboarding process: Terminated vendor accounts with active credentials are a common finding in penetration tests. Build offboarding into your vendor management workflow and verify access revocation with your IAM team within 24 hours of contract termination.

Lesson Summary

  • Third-party vendors extend your attack surface — a TPRM program is essential for any Saudi financial institution, not optional
  • The TPRM lifecycle has five phases: inventory and tiering, due diligence, contractual controls, continuous monitoring, and offboarding
  • Use a quantitative scoring matrix to tier vendors consistently and allocate assessment resources proportional to risk
  • SAMA CSCC Domain 5 and NCA ECC explicitly require third-party risk management — auditors will ask for your vendor register, due diligence evidence, and contract clauses

Next Lesson

In the next lesson, we will cover: Business Continuity Planning and Disaster Recovery — how to design, test, and maintain BCP/DR plans that keep your organization operational when the worst happens, with specific alignment to SAMA and NCA expectations for Saudi financial institutions.


Ready to apply these concepts in your organization? Contact Fyntralink for a complimentary SAMA Cyber Maturity Assessment.