‹‹ Back

7 Evaluation Methods for Assessing Your Suppliers' Cyber Risk

Cyber Provider Risk: A Major Strategic Challenge

The digital supply chain has become the weak link for many organizations. Recent attacks—such as those targeting Jaguar Land Rover, Marks & Spencer, or compromises via Managed Service Providers (MSPs)—have demonstrated that a vulnerable supplier can become the vector for a devastating cyberattack. According to the 11th edition of the CESIN barometer, 1/3 of incidents originate from flaws in suppliers or partners.

This reality requires CISOs and cybersecurity teams to exercise increased vigilance over their provider ecosystem. Regulators have clearly understood this: NIS2, DORA, or even the requirements of the Critical Entities Resilience Act (CRA) place third-party risk management at the heart of compliance obligations. Beyond compliance, the very operational resilience of the organization is at stake.

Faced with this observation, the question is no longer whether to evaluate suppliers, but how to do so effectively, proportionately, and continuously. Several methodologies coexist, each with its own specificities. This article provides an overview of the main cyber evaluation approaches for suppliers to help cybersecurity professionals build a framework adapted to their context:

  • Security clauses in contracts
  • Security questionnaires
  • Security Assurance Plans (SAP)
  • Third-party security policy
  • Third-party audits
  • Cyber rating solutions and attack surface monitoring
  • Third-party certifications and attestations

Security clauses in contracts

Contractual security clauses constitute the legal foundation of the relationship of trust with a supplier. They formalize mutual commitments regarding cybersecurity:

  • Incident notification obligations,
  • Compliance with standards (ISO 27001, SOC 2),
  • Implementation of specific technical measures,
  • Right to audit.

These clauses naturally apply when establishing a new business relationship or renewing a contract, particularly for suppliers with access to sensitive data or critical systems.

This approach has become widely generalized: according to the 2026 CESIN barometer, 85% of surveyed organizations regarding measures taken to address third-party risk cite security clauses in contracts, confirming their status as the essential foundation of any TPRM approach.

The primary advantage lies in their binding force. They create an enforceable legal framework and constitute proof of due diligence for regulators. However, their static nature is problematic: once signed, they only evolve at the pace of contract renegotiations, while the threat landscape changes constantly. Furthermore, when dealing with dominant suppliers (major cloud providers, critical software vendors), the margin for negotiation can be very limited. Finally, a clause, no matter how well-drafted, does not guarantee effective compliance without an associated monitoring mechanism.

Security questionnaires

Security questionnaires allow for the collection of structured information regarding a supplier's cybersecurity practices. They generally cover a broad spectrum:

  • Security governance,
  • Access management,
  • Data protection,
  • Business continuity,
  • Incident response.

Standardized frameworks exist, such as the SIG (Standardized Information Gathering) or the CSA's CAIQ, which facilitate the exercise by providing common bases.

These tools are particularly suited for the onboarding phase or during periodic reassessments. They allow for a first level of evaluation to filter suppliers and quickly identify risk areas. For organizations managing large supplier portfolios, they standardize the approach and facilitate comparisons. Using standardized questionnaires offers an additional advantage: mature suppliers often have pre-filled responses, which accelerates the process.

The massive adoption of this method is confirmed by the CESIN barometer: 74% of respondents state they use security questionnaires to address third-party risk, making it one of the most widespread approaches on the market.

The main pitfall remains their self-reported nature: responses reflect what the provider wishes to communicate, without a guarantee of truthfulness. "Questionnaire fatigue" is also real: suppliers solicited by multiple clients may provide superficial answers. Analysis can also be time-consuming, especially for questionnaires exceeding 300 questions. Finally, they offer a snapshot at a single point in time and do not detect subsequent degradations in security posture.

Security Assurance Plans (SAP)

The Security Assurance Plan goes further than traditional contractual clauses. This document details all the security measures the supplier commits to implementing: processes, technical controls, organizational responsibilities, and security metrics. It constitutes an enforceable and precise reference, particularly suited for complex, long-term services or those involving sensitive processing.

SAPs are frequently found in outsourcing contracts, critical application development, sensitive data hosting, or in regulated sectors (healthcare, defense, critical infrastructure). It fits naturally into a "security by design" approach and allows for fine-tuning security requirements to the specific context of the service. The document also provides a solid basis for subsequent audits and relationship management.

The 2025 TPRM Observatory shows an increasing use of this tool: 75% of respondents cite the Security Assurance Plan among their supplier cyber risk evaluation methods, a significant increase from the previous edition (66.3%).

Its main limitation is the required investment: drafting an SAP takes time and expertise from both parties. For low-criticality or short-term services, this level of formalism may be disproportionate. There is also a risk of producing an exhaustive but non-operational document that ends up in a virtual drawer. As with contractual clauses, the SAP can quickly become obsolete without an update mechanism, and its verification requires regular audits.

Third-party security policy

Even before choosing evaluation methods, a mature organization must define its third-party security policy. This internal governance document establishes the framework applicable to supplier cyber risk management: classification criteria based on criticality, minimum requirements per category, evaluation and reassessment processes, roles and responsibilities, and methods for handling discrepancies.

This policy is the cornerstone of a structured program, especially in organizations with an extensive third-party ecosystem. It harmonizes practices across different entities of a group and ensures consistency in the approach. By clearly defining roles, it facilitates collaboration between procurement, business units, legal, and security teams. Above all, it allows for proportioning evaluation efforts to the actual criticality of suppliers, thus optimizing the security team's limited resources.

The formalization of such a policy is progressing rapidly. The 2026 CESIN barometer includes a dedicated item for the first time: "Definition of a third-party security policy," adopted by 55% of respondents, proving that this structuring approach is gaining ground.

However, beware: a policy is only valuable if it is effectively applied, just like contractual clauses. The risk is producing a theoretical document without operational translation due to a lack of resources, tools, or stakeholder buy-in. Implementation often requires organizational changes and investments that not all organizations can afford. An overly rigid policy can also create friction with business units and slow down purchasing cycles, highlighting the need to find the right balance between security and business agility.

Third-party audits

Security audits allow for the factual verification of a supplier's compliance with its commitments. They can take various forms: documentary audits (review of procedures, logs), on-site audits (site visits, observation of practices), technical audits (penetration tests, code reviews, vulnerability scans), or process audits. Unlike self-reported approaches, they concretely verify the implementation of security controls.

Audits are necessary for critical suppliers with access to sensitive data or those performing essential functions. Certain regulatory contexts (DORA for the financial sector, HDS for health data) make them mandatory. They are also relevant when doubts exist regarding a supplier's declarations or following a security incident. Technical audits, in particular, can reveal concrete vulnerabilities that might have been missed in a documentary evaluation.

The main barrier remains cost: an in-depth audit can require several man-days and specialized skills. This level of investment can only be granted to a limited number of critical suppliers. Audits also require the cooperation of the supplier, who may be reluctant for reasons of confidentiality or workload. Finally, as with questionnaires, an audit only offers a snapshot at a given moment: the security posture can degrade quickly afterward without being detected.

The 2025 TPRM Observatory reveals that 31% of organizations cite the lack of mutualized audits among their main difficulties, highlighting the need to better coordinate these costly efforts between clients of the same supplier.

Cyber rating solutions and attack surface monitoring

Cyber rating solutions emerged to address the limitations of one-off approaches. These technological platforms automatically and continuously evaluate an organization's external cybersecurity posture using publicly accessible data. They scan the attack surface exposed on the Internet (domains, SSL certificates, open ports, known vulnerabilities), analyze security configurations (SPF, DMARC, DKIM), detect the presence of compromised data in leaks, and aggregate these elements into a risk score.

These solutions are particularly suited for the continuous monitoring of a large supplier portfolio, where manual approaches reach their limits. They allow for the simultaneous monitoring of hundreds or even thousands of third parties with limited human effort. Automatic alerts in the event of a score degradation or the detection of a new vulnerability allow for increased responsiveness. They are also useful during initial due diligence, offering a quick first filter to identify suppliers showing obvious red flags.

An emerging trend demonstrates the collaborative potential of these tools: according to the 2025 TPRM Observatory, 25% of surveyed companies now share the performed cyber rating with their suppliers, aiming for support and collaborative improvement of their cybersecurity maturity.

However, it is important to understand their limits. These tools only evaluate the external attack surface and provide no visibility into internal controls, governance, or organizational practices. A supplier could have an excellent score while having major weaknesses in internal access management or incident response.

Third-party certifications and attestations

Rather than conducting their own evaluations, organizations can rely on certifications obtained by their suppliers from independent bodies. ISO 27001, SOC 2 Type II reports, HDS certification for the medical sector, or specific industry labels serve as benchmarks for evaluating a supplier's maturity. These certifications generally involve regular audits by accredited bodies.

This approach is particularly relevant for standardized suppliers offering services to multiple clients: cloud providers, hosters, SaaS vendors. It allows for the pooling of audit efforts rather than each client individually auditing the same supplier. For organizations managing hundreds of suppliers, relying on existing certifications significantly reduces the evaluation burden. Recognized frameworks cover a wide range of security controls and constitute tangible proof of compliance for regulators.

This rationalization through certifications is gradually becoming a mature practice. The 2025 TPRM Observatory indicates that 77% of organizations prioritize relying on recognized certifications (ISO, SOC 2) to avoid systematically sending security questionnaires, thereby optimizing their evaluation workload.

However, not all certifications are equal in terms of rigor and scope. It is essential to precisely verify the scope: does it cover the service or product being used? What was the date of the last audit? Some certifications are more focused on processes than on the actual effectiveness of controls. A certification attests to a level of compliance at a specific time but does not guarantee its maintenance over time. Recertification cycles can be far apart (up to 3 years for ISO 27001), leaving windows during which degradations can occur. Finally, some suppliers present convenience or partial certifications that provide a false sense of security.


Toward a Combined and Proportionate Approach

Faced with the diversity of available methods, it would be illusory to seek a single solution. The maturity of a supplier risk management program lies in the ability to judiciously combine these approaches based on the context. Not all suppliers present the same level of risk, and the intensity of the evaluation must be proportionate to the actual criticality.

A third-party classification model (based on service criticality, data sensitivity, and system access level) allows for tailoring the approach. Critical suppliers justify a significant investment: strict contractual clauses including the right to audit, detailed SAP, regular audits, and continuous monitoring via cyber rating. Medium-risk suppliers can be evaluated via in-depth questionnaires and verification of relevant certifications. Low-risk suppliers often require only a minimal check of certifications and automated monitoring.

Each method compensates for the weaknesses of others: cyber rating detects degradations between two audits, audits verify what the questionnaire only asks, and contractual clauses provide leverage to demand remediation.

Supplier risk management is not a one-off project but a continuous process. Evaluation methods must be regularly reviewed and adjusted based on feedback, the evolving threat landscape, and the organization's growing maturity. Progressive automation, via TPRM platforms integrating questionnaires, cyber rating, and document management, allows for gains in efficiency and scalability.

Where to start? A Roadmap According to Your Maturity

The diversity of evaluation methods can seem intimidating, especially when starting out. The good news: it is not necessary to deploy everything simultaneously. The key is to adopt a progressive and proportionate approach.

If you have nothing in place, start by mapping your critical suppliers and contractually securing new relationships. Then, focus your initial evaluation efforts (questionnaires, certification checks) on your 5-10 most sensitive suppliers before considering a cyber rating solution to monitor a broader perimeter.

If you are already using questionnaires, it is time to move from self-reported to factual data: complete your framework with a cyber rating solution to detect discrepancies between what your suppliers declare and their actual posture, formalize a third-party security policy to structure your approach, and plan audits for your most critical suppliers.

In any case, avoid these common pitfalls: seeking perfection at the expense of action, forgetting regular reassessment, disconnecting from business needs, or identifying risks without planning a remediation process.

Would you like to learn more about building your TPRM program? Contact our team and let's build your TPRM program together

Ultimately, the relevance of an evaluation program is measured not by the number of methods deployed but by its ability to effectively identify significant risks, prioritize them intelligently, and manage their reduction over time. In an environment where security budgets and resources remain constrained, the challenge is to concentrate efforts where the risk is real, while maintaining minimal visibility across the entire third-party ecosystem. Start small, learn fast, and adjust continuously: this is the key to a TPRM program that lasts.

Enjoyed this article? Subscribe to our newsletter so you never miss a new post!

Subscribe