When an organization partners with a third-party vendor, that third party introduces a new set of risks for the organization. These pose a potential threat that could disrupt operations, cause financial losses, or damage reputations.
Identifying and understanding inherent third-party risk is crucial to protect organizations. Assessing third-party inherent risks before beginning a relationship shows which vendors pose the highest risk and what steps are needed to manage and mitigate them.
What is inherent third-party risk and how can you identify it? Let’s review the basics to gain a better understanding of how to safeguard your organization.
Inherent third-party risk is the risk that exists naturally in a third party’s product or service with no safeguards or controls in place. It’s the first impression of the third-party vendor and the amount of risk it poses.
One way to define inherent risk is with this formula:
Inherent Risk = Impact × Probability
This formula shows how an event’s potential impact and likelihood come together to determine risk before any controls are in place.
Inherent third-party risk is tiered, or rated, into categories like low, medium, and high. Some organizations include more tiers, like medium-low and medium-high, which provides more nuance with specific requirements assigned.
Other organizations may choose a numbered system — where Tier 1 third parties are the most critical and Tier 5 third parties present the lower amount of risk.
Whichever method you choose, make sure it’s defined. Clear guidelines are essential to assessing risk without controls.
Your organization has no control over a third party’s inherent risk — it can’t simply be removed from the product or service. Instead, your organization must review the third party’s controls to mitigate the risk and implement your own.
Related: How to Review Third-Party Risk with Vendor Risk Assessments
There are many different types of inherent third-party risk, with some vendors — like a third-party payment processor — falling into more than one category. Although many inherent third-party risks can overlap with each other, assess each risk independently.
An example of inherent third-party risk is when a vendor needs access to your organization’s or customers’ sensitive information. If this data is transmitted electronically, which is almost always the case, then the third-party vendor presents inherent information security/cybersecurity risk, compliance risk, reputational risk, and operational risks.
If the vendor fails to protect the information, your organization can be held liable, creating compliance risk. If the vendor experiences a cyberattack or service outage, you're exposed to operational and reputational risk, among others.
These inherent risks exist naturally with the third party and need controls applied before entering into the relationship.
Related: What Vendor Documents Are Needed to Assess Cybersecurity
Once you’ve identified a third party’s inherent risk, it’s important to understand what to do next. After all, one of the primary functions of third-party risk management is knowing how to handle vendor risk.
Determining Control Effectiveness
It’s time to review the vendor’s controls, assess the effectiveness, and add your own, if needed, to further mitigate the risks. The formula for control effectiveness is:
Control Effectiveness = Control Impact × % Ineffective
Control effectiveness depends on two key factors:
Control Impact – The degree to which a control reduces risk. Controls should be rated on a scale (e.g., very important, important, or not very important). For instance, a firewall is typically very important for preventing cyber threats because it protects the entire organization. A less effective control might be blocking specific IP addresses because it’s easy for a cyberattacker to change their IP address.
Likelihood of Effectiveness – The probability that a control will function as intended, based on assessments and monitoring.
Here are next steps for managing and mitigating inherent third-party risk:
Dealing with inherent third-party risk can be tricky to navigate, but it’s essential to understand within your third-party risk management program. Being able to identify the type of inherent third-party risk and knowing how to best manage and mitigate it is an important strategy that creates a valuable vendor partnership.
What should you do with a third party’s inherent and residual risks? Learn more in this eBook.