Skip to main content
FORTISEU
ImplementationNIS2DORAGDPRISO 27001

How to Create a Third-Party Vendor Management Policy

14 minUpdated 2026-03-18

Step-by-step guidance on creating a third-party vendor management policy that covers scope definition, EU regulatory alignment, classification and assessment frameworks, monitoring, incident response, approval workflows, and ongoing policy maintenance.

Key Takeaways
  1. 1

    Define the policy scope to cover all relevant third-party categories, including ICT providers as broadly defined by DORA Article 3(19), and specify applicability across business units and subsidiaries.

  2. 2

    Map NIS2, DORA, GDPR, and ISO 27001 requirements to specific policy sections using a compliance matrix that serves as both a drafting guide and an audit artefact.

  3. 3

    Implement a risk-tiered classification model with differentiated assessment depth, monitoring frequency, and approval requirements for each tier.

  4. 4

    Embed enforceable approval workflows with named authorities, documented decision criteria, and exception management procedures.

  5. 5

    Review the policy at least annually as required by DORA Article 28(2), with trigger-based out-of-cycle reviews and a maintained version history.

Policy Purpose and Scope

A third-party vendor management policy is the foundational governance document that defines how your organisation identifies, assesses, engages, monitors, and terminates relationships with external service providers. Its purpose is twofold: to protect the organisation from risks introduced through third-party relationships, and to demonstrate regulatory compliance to supervisory authorities, auditors, and clients. Without a formal policy, vendor risk management activities tend to be inconsistent, undocumented, and reactive — conditions that are incompatible with the expectations of EU regulators under NIS2, DORA, and GDPR.

The scope of the policy must be clearly defined at the outset. Specify which types of third-party relationships are covered: ICT service providers, data processors, sub-processors, professional services firms, cloud infrastructure providers, managed security service providers, and any other category relevant to your organisation. Address whether the policy extends to fourth parties (your vendors' vendors) and, if so, to what depth. DORA's definition of ICT third-party service provider in Article 3(19) is broad, encompassing any undertaking that provides digital and data services through ICT systems, including hardware, software, and cloud computing services.

Define the applicability of the policy within your organisational structure. Specify which business units, subsidiaries, and geographic entities are subject to the policy. For multi-entity organisations, clarify whether the policy operates at the group level or whether individual entities may maintain supplementary policies that extend (but do not weaken) the group-level requirements. Identify the policy owner — typically the CISO, CRO, or Head of Third-Party Risk Management — and the governance body responsible for policy oversight and periodic review.

EU Regulatory Requirements for Vendor Policies

Multiple EU regulatory frameworks impose specific requirements that must be reflected in your vendor management policy. Understanding these requirements is essential to drafting a policy that satisfies all applicable obligations without creating unnecessary duplication or internal conflict. The key frameworks are NIS2, DORA, GDPR, and, for organisations pursuing certification, ISO/IEC 27001:2022.

NIS2 Article 21(2)(d) requires essential and important entities to adopt measures for supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers. The NIS2 Implementing Regulation (Commission Implementing Regulation (EU) 2024/2690) further specifies that entities must establish a supply chain security policy that sets out criteria for selecting and contracting suppliers and service providers, taking into account their cybersecurity practices and the results of coordinated security risk assessments of critical supply chains conducted at Union level.

DORA Chapter V establishes a comprehensive framework for managing ICT third-party risk within the financial sector. Articles 28-30 require financial entities to adopt strategies on ICT third-party risk, maintain a register of contractual arrangements, conduct pre-contractual due diligence, include specific contractual provisions, and develop exit strategies. GDPR Articles 28 and 29 impose obligations on controllers regarding the selection, instruction, and contractual governance of data processors. ISO 27001:2022 Annex A Control 5.19 (Information security in supplier relationships) and 5.20 (Addressing information security within supplier agreements) provide a certification-aligned control framework. Your policy must synthesise these overlapping but non-identical requirements into a coherent internal standard.

A practical approach is to map each regulatory requirement to a specific section of your policy, creating a compliance matrix that demonstrates coverage. This matrix serves as both a drafting aid and an audit artefact, making it straightforward for auditors and regulators to verify that the policy addresses all applicable obligations. Where requirements conflict or create tension — for example, where DORA mandates specific contract terms that go beyond GDPR Article 28 minimums — the policy should adopt the more stringent requirement.

The NIS2 Implementing Regulation (EU) 2024/2690 published on 17 October 2024 provides detailed supply chain security policy requirements. Organisations subject to NIS2 should review Articles 11-12 of this regulation when drafting their vendor management policy.

Policy Structure: Classification, Assessment, Monitoring, and Incident Response

The core of a vendor management policy is the operational framework that governs how vendors are classified by risk, assessed for security and compliance, monitored on an ongoing basis, and managed during incidents. This framework must be specific enough to be actionable while flexible enough to accommodate the diversity of vendor relationships your organisation maintains.

Vendor classification should use a tiered model based on objective criteria. A three-tier or four-tier model is typical: critical (vendors supporting critical or important functions, processing sensitive data, or with deep network access), high (vendors with significant data access or service dependencies), medium (vendors with limited data access or operational impact), and low (commodity vendors with no data access and minimal operational relevance). The classification criteria should include data sensitivity, service criticality, substitutability, regulatory significance, geographic risk, and the vendor's own security maturity. DORA's concept of critical or important functions (Article 3(22)) should be directly integrated into the classification methodology for financial entities.

For each risk tier, define the required assessment depth, frequency, and methods. Critical vendors should undergo comprehensive initial assessments and at least annual reassessments, including security questionnaires, documentation review, and on-site or virtual technical assessments. High-risk vendors require detailed initial assessments and annual questionnaire-based reassessments. Medium-risk vendors may be assessed through standardised questionnaires at onboarding and biennially thereafter. Low-risk vendors may be covered by basic due diligence at onboarding only. The monitoring section should specify continuous monitoring mechanisms (security ratings, threat intelligence, financial health monitoring) and periodic review activities (access recertification, contract compliance reviews, performance evaluations). The incident response section should define the vendor's notification obligations, the organisation's escalation procedures, and the coordination mechanisms between the organisation's incident response team and the vendor during security incidents.

Approval Workflows and Governance

A vendor management policy without enforceable approval workflows is a statement of aspiration, not a governance mechanism. The policy must define who has authority to approve vendor engagements at each risk tier, what information is required to support approval decisions, and how approvals are documented and tracked. These workflows should be embedded in your procurement and vendor management processes so that no vendor engagement can proceed without the required approvals.

For critical and high-risk vendors, the approval workflow should involve multiple stakeholders: the requesting business unit, information security, legal/compliance, data protection (where personal data is involved), and a senior executive or risk committee. The policy should specify the decision criteria at each approval gate — not just that approval is required, but what the approver is certifying. For example, the information security approver certifies that the vendor's security posture is acceptable given the risk classification, that appropriate security controls are specified in the contract, and that monitoring mechanisms are defined.

Governance structures should include a regular vendor risk review forum — typically quarterly for the full vendor portfolio and monthly for critical vendors — where risk owners report on vendor performance, emerging risks, assessment findings, and incident activity. This forum should have escalation authority to the board or executive risk committee for material vendor risk issues. The policy should also define exception management procedures: how, when, and by whom exceptions to policy requirements can be granted, what conditions or compensating controls apply, and how exceptions are time-limited and tracked to resolution.

Vendor management policies that lack defined approval authorities and escalation paths consistently produce audit findings. Ensure every approval gate specifies named roles (not just departments), decision criteria, and documentation requirements.

Template Structure and Ongoing Maintenance

A well-structured vendor management policy document typically follows a standard policy format that facilitates navigation, review, and compliance verification. The recommended structure includes: executive summary, purpose and scope, definitions, roles and responsibilities, vendor classification methodology, risk assessment framework, contractual requirements, ongoing monitoring and review, incident management, exit and offboarding, exception management, policy compliance and enforcement, and appendices (including the regulatory compliance matrix, classification criteria tables, and template forms).

The definitions section is particularly important in the EU regulatory context, where terms like 'critical or important function,' 'ICT third-party service provider,' 'sub-outsourcing,' and 'concentration risk' have specific regulatory meanings under DORA and NIS2. Adopting the regulatory definitions verbatim (with citations) ensures consistency between your policy and the regulatory frameworks it implements. Where your policy uses terms that are not defined in regulation — such as internal risk tier labels or assessment types — define them explicitly to prevent ambiguity.

Policy maintenance is not optional; it is a regulatory expectation. DORA Article 28(2) requires that the strategy on ICT third-party risk be reviewed at least once a year. Your vendor management policy should specify its own review cycle (at least annual), the trigger events that require out-of-cycle reviews (regulatory changes, material incidents, organisational restructuring), and the approval process for policy amendments. Maintain a version history and changelog that records every revision, the rationale for each change, and the approver. Distribute updated versions to all relevant stakeholders and provide training or briefings to ensure that personnel involved in vendor management understand and can apply the current policy requirements.

Include a regulatory mapping appendix in your policy that cross-references each policy section to the specific NIS2, DORA, GDPR, and ISO 27001 requirements it addresses. This single artefact dramatically simplifies audit preparation and regulatory examinations.

Frequently Asked Questions

What is the minimum content required for a DORA-compliant vendor management policy?

DORA Article 28(2) requires financial entities to adopt a strategy on ICT third-party risk as part of their ICT risk management framework. This strategy must include a policy on the use of ICT services supporting critical or important functions provided by ICT third-party service providers, including at minimum: guidelines for the assessment and monitoring of ICT third-party risk, key contractual provisions, risk assessment methodology, exit planning requirements, and mechanisms for maintaining a register of all ICT third-party contractual arrangements. The policy should also address concentration risk, sub-outsourcing controls, and the interaction between the vendor management framework and the broader operational resilience programme.

How does ISO 27001:2022 Annex A address supplier relationships?

ISO 27001:2022 Annex A includes three controls directly relevant to vendor management. Control 5.19 (Information security in supplier relationships) requires organisations to define and implement processes and procedures for managing information security risks associated with the use of supplier products and services. Control 5.20 (Addressing information security within supplier agreements) requires that relevant information security requirements are established and agreed with each supplier. Control 5.21 (Managing information security in the ICT supply chain) specifically addresses risks related to the ICT products and services supply chain. Together, these controls require a documented policy, contractual security requirements, and supply chain risk management — all of which should be reflected in your vendor management policy.

Should the vendor management policy be a standalone document or part of a broader policy?

Best practice is to maintain a standalone vendor management policy that is explicitly linked to your organisation's information security policy, ICT risk management framework, and data protection policies. A standalone document provides clarity of ownership, facilitates targeted reviews and updates, and can be shared with regulators and auditors without exposing the entirety of your information security policy framework. However, the policy must not exist in isolation — it should cross-reference and be consistent with related policies on information security, data protection, business continuity, incident management, and procurement.

How should the policy address vendor concentration risk?

DORA Article 29 specifically addresses ICT concentration risk, requiring financial entities to identify, assess, and manage the risk that dependence on a limited number of ICT third-party providers may create. Your policy should require periodic assessment of concentration across providers, services, geographies, and technology stacks. Define thresholds that trigger escalation — for example, when a single provider supports more than a defined percentage of critical functions, when multiple critical functions depend on the same underlying cloud infrastructure, or when geographic concentration creates sovereign risk exposure. Include provisions for diversification planning and contingency arrangements to mitigate identified concentration risks.

Who should own the vendor management policy?

Policy ownership typically rests with the CISO, Chief Risk Officer, or a dedicated Head of Third-Party Risk Management, depending on the organisation's structure and the regulatory context. In financial entities subject to DORA, the management body bears ultimate responsibility for the ICT risk management framework including third-party risk (Article 5(2)), so the policy owner should report to or be accountable to the management body. Regardless of ownership, the policy requires cross-functional input from information security, legal, compliance, data protection, procurement, and business unit stakeholders to ensure comprehensive coverage and operational feasibility.

Ready to Operationalise This?

Turn this guide into working compliance workflows. Create an account or schedule a personalised demo.