Browse docs sections

Third-Party Risk Response

Assess and communicate supplier or vendor security issues with clear internal action plans.

Use this playbook when a vendor incident or supplier CVE raises potential exposure for your organization.

Assessment Workflow

Exposure Identification

  • Identify which systems and teams depend on the affected vendor.
  • Confirm whether vulnerable components are enabled in your environment.
  • Separate confirmed impact from hypothetical scenarios.

Response Planning

  • Define immediate containment or compensating controls.
  • Coordinate with legal, procurement, and business owners.
  • Set communication cadence for leadership updates.

Vendor Incident Prompt

bash

Assess our risk from [vendor incident/CVE]. Return:

  1. likely exposure points in our environment,
  2. immediate containment actions,
  3. information to request from the vendor,
  4. leadership-ready risk summary.

Decision Framework

DecisionTriggerOwner
Continue operationsLow exposure + compensating controls activeSecurity + business owner
Partial restrictionMedium exposure or uncertain vendor responseSecurity + IT operations
Full isolation/stop useHigh-confidence compromise riskSecurity leadership + executive sponsor

Communication Checklist

  • State what is confirmed versus pending confirmation.
  • Provide clear current risk level and potential business impact.
  • Include next update time and responsible owner.