The CRF – Third Party Risk Model (CRF–TPRM) is a repeatable framework designed to help organizations assess, control, and validate risks arising from external relationships. As businesses grow more dependent on vendors, suppliers, contractors, and service providers, third-party risk becomes a critical concern. The 2025 edition of CRF–TPRM offers a structured, seven-step process—aligned with CRF’s Governance & Risk Model (GRM)—to govern external dependencies with the same rigor applied to internal cybersecurity. Rather than presenting abstract concepts, CRF–TPRM emphasizes operational execution: which safeguards to require, how to embed them contractually, and how to validate compliance over time.
Modern organizations depend on a broad ecosystem of vendors, suppliers, and service providers to operate and grow. But these relationships also introduce cybersecurity, compliance, and operational risks that can’t be managed through ad hoc reviews or informal checklists.
The CRF–Third Party Risk Model provides a structured, scalable approach to managing those risks. It:
With this model, third-party risk management becomes a coordinated, proactive discipline—not just a compliance checkbox.
The 2025 edition of the CRF–TPRM delivers:
The CRF–TPRM is essential for:
Security Leaders formalizing third-party governance structures and oversight practices.
Procurement and Legal Teams responsible for vendor selection, contract negotiation, and enforcement of security obligations.
Risk and Compliance Managers building or maturing third-party risk programs in industries subject to privacy, regulatory, or contractual requirements.
Business Unit Owners overseeing critical vendor relationships and needing clear guidance on assessment criteria
Organizations of All Sizes—from startups establishing their first vendor oversight program to large, regulated enterprises refining mature third-party governance.
The Third Party Risk Model is a practical, seven-step framework that guides organizations through the end-to-end process of identifying, assessing, and managing risks posed by external vendors, suppliers, and service providers. It emphasizes operational execution—embedding safeguards into contracts, validating controls, and communicating risk posture—to ensure that third-party relationships support, rather than jeopardize, business objectives.
As organizations become more interconnected, third-party dependencies introduce cybersecurity, compliance, and operational risks. Without a structured TPRM approach, vendor oversight is often inconsistent, reactive, and fragmented. The CRF–TPRM provides a repeatable process to align vendor selection, contracting, and validation with organizational risk tolerance—transforming third-party risk from a liability into a strategic enabler.
CRF–TPRM follows a seven-step roadmap:
Initiate: Secure executive sponsorship, define scope, and establish governance structures.
Inventory: Catalog all third-party relationships and classify vendors by risk.
Select: Define risk criteria, develop a safeguards library, and prioritize controls based on vendor tier.
Educate: Train internal teams and inform external partners of security expectations.
Contract: Embed safeguards into legal agreements to ensure enforceability.
Validate: Collect evidence, review audit reports, and use continuous monitoring to confirm vendor compliance.
Communicate: Provide tailored reports to executives, business owners, and technical teams—enabling data-driven decision-making.
A successful TPRM program requires cross-functional collaboration among:
Executive Sponsors (e.g., CISO, Risk Committee): Provide leadership commitment and resources.
Procurement and Sourcing Teams: Integrate TPRM steps into vendor selection and contracting workflows.
Legal Counsel: Review and negotiate contract language to embed security and compliance obligations.
IT and Security Operations: Define technical controls, validate evidence, and monitor ongoing compliance.
Business Unit Leaders: Own critical vendor relationships, approve risk assessments, and manage exceptions.
Gather Early Data: Compile existing vendor lists from procurement, finance, and IT.
Secure Sponsorship: Appoint an executive sponsor and form a cross-functional TPRM working group.
Draft a Program Charter: Define objectives, scope, roles, and decision-making authority.
Select a System of Record: Choose a centralized platform or repository (spreadsheet, GRC tool) to track inventory and assessments.
Begin Inventory: Classify vendors by type, function, and risk exposure, then apply risk-tiering criteria.
Provide your email address below, and we’ll instantly send the Third Party Risk Model – v2025 to your inbox.