TPRM: 40% of disruptions start with third parties — DORA and NIS2 require formal management
Vendor due diligence and continuous third-party risk management: supply chain risk, DORA, NIS2, ongoing monitoring, SLA management, and exit strategies.
Does this apply to your business?
Do you have an up-to-date inventory of all suppliers with access to your critical systems or data, classified by criticality level?
Have you conducted a formal assessment of the cybersecurity posture and continuity capacity of your most critical suppliers?
Do your contracts with critical suppliers include audit clauses, incident notification obligations, SLAs with penalties, and exit rights?
Do you have a documented exit strategy for your most critical ICT or data suppliers?
0 of 4 questions answered
Our TPRM programme: from inventory to continuous monitoring
Third-party inventory and classification
We identify all suppliers and third parties with access to the organisation's critical systems, data, or processes. We classify them by criticality and potential risk level, prioritising the assessment process by the impact their failure or compromise would generate.
Initial due diligence on critical suppliers
We conduct due diligence on critical suppliers: assessment of their cybersecurity posture, business continuity capacity, relevant regulatory compliance (GDPR, NIS2, DORA), financial health, and operational references. Includes structured questionnaires, certification review, and on-site audits where warranted.
Contractual framework and risk SLAs
We review and strengthen the contractual framework with critical suppliers: business continuity clauses, cybersecurity requirements, audit rights, incident notification obligations, service levels (SLAs) with penalties, and exit and transition clauses.
Continuous monitoring and lifecycle management
We implement the continuous monitoring process for critical third parties: risk alert tracking (adverse news, security incidents, regulatory changes), periodic risk assessment review, and supplier lifecycle management including activation of exit strategies when required.
The challenge
A company is only as resilient as its most critical suppliers. The failure of a technology provider, logistics partner, or data processor can disrupt operations, compromise customer data, or generate regulatory breaches just as a severe internal incident would. Yet most companies have no systematic process for evaluating and monitoring third-party risks — they assume their supplier is secure because they have worked together for years.
Our solution
We implement third-party risk management (TPRM) programmes adapted to each organisation's sector and risk profile: from initial due diligence on critical suppliers to ongoing monitoring, SLA management, and exit strategy planning. For financial entities we address DORA's specific requirements; for entities in essential sectors we coordinate with NIS2 supply chain obligations.
Third-Party Risk Management (TPRM) is the systematic process of identifying, assessing, monitoring, and mitigating the risks posed by suppliers, technology providers, and other external parties that have access to an organisation's critical systems, data, or processes. In the EU regulatory context, DORA (Digital Operational Resilience Act, applicable from January 2025) imposes specific TPRM obligations on financial entities regarding their critical ICT providers, including mandatory contractual clauses, enhanced due diligence, and incident notification requirements. NIS2 (transposed into Spanish law) similarly requires essential and important sector entities to assess and manage the cybersecurity risks of their digital supply chains.
Our third-party risk management team combines corporate due diligence expertise with knowledge of cybersecurity, digital regulation, and contract management for critical technology providers.
Why third-party dependency is the fastest-growing source of operational risk
Dependence on third parties is a structural feature of modern business. Companies outsource critical functions — data processing, technology infrastructure, logistics, payroll management — that twenty years ago were internally controlled capabilities. This outsourcing generates efficiency, but it also transfers risk: when the supplier fails, that supplier’s customers bear the consequences. The collapse of a cloud service provider, a ransomware attack on a payments processor, or the insolvency of a logistics partner can halt operations as severely as an internal disaster — with the added difficulty that the company has far less direct control over the incident.
The 40% of serious business disruptions that originate in third-party failures is not a figure that companies can afford to ignore, particularly under DORA for financial entities and NIS2 for essential and important entities. Both regulations require formal documentation and management of supply chain risks, with the possibility of sanction if the requirements are not met. The typical scenario: a company depends on a cloud provider for its ERP, the provider suffers a 24-hour outage, and on reviewing the contract the company discovers the SLA only guarantees 99.5% monthly availability (equivalent to 3.6 acceptable hours of downtime per month without compensation), there are no continuity clauses, and the provider has no obligation to notify incidents.
Our TPRM programme: from inventory to continuous monitoring
The first step is always visibility. Most organisations do not have a complete, up-to-date inventory of their critical suppliers: they know their main vendors, but lack a systematic classification of which ones, if they failed, would have a severe impact on operations or regulatory compliance. Building that inventory — with classification by criticality, system and data access, and regulatory risk level — is the foundation of any effective TPRM programme.
Our professionals implement the TPRM programme in three phases. The first is visibility: we build the complete inventory of third parties with access to critical systems, data, or processes, and classify them by criticality level (critical, important, ordinary). The second is assessment: for critical suppliers we conduct structured due diligence with a security questionnaire, certification review (ISO 27001, SOC2, ENS), and continuity capacity assessment. The third is protection: we review and strengthen contracts with critical suppliers (audit clauses, incident notification within 24 hours, SLAs with penalties, exit and transition clauses) and implement the continuous monitoring system with real-time risk alerts.
Supplier due diligence goes well beyond reviewing certifications. Assessing the real cybersecurity posture of a supplier — not just whether they hold ISO 27001, but how they actually manage incidents, how they segment access to their clients’ systems, what happens to the company’s data if the supplier is acquired — requires detailed questionnaires, technical review, and in the most critical cases, on-site audits. For financial entities subject to DORA, this process is governed by specific minimum contractual requirements that we manage end to end. We integrate third-party monitoring with the risk register of the corporate ERM framework to ensure that supplier risks have visibility at the leadership and board level. For companies that have also implemented a business continuity plan, TPRM is the essential complement that covers risks originating outside the organisation, and we coordinate with data protection obligations for suppliers that process personal data on the organisation’s behalf.
What our TPRM service includes
The service covers the inventory and classification of all third parties with access to critical systems or data, structured due diligence on critical suppliers (security questionnaire, certification review, continuity assessment, risk report with recommendations), review and strengthening of contractual framework with security, audit, SLA, and exit clauses, continuous monitoring system with risk alerts, annual review of critical supplier assessments, integration with corporate ERM risk register, and for financial entities, compliance with DORA’s specific ICT provider management requirements.
Real results in third-party risk management
Companies that implement the TPRM programme with our team identify on average between three and eight critical suppliers whose contracts lack minimum protection clauses in the event of a failure or security incident. Renegotiation of these contracts generates concrete protections: SLAs with real penalties, incident notification clauses within 24 hours, and audit rights. Detection time for a problem in a critical supplier is reduced from days or weeks to hours through the continuous monitoring system. And for entities subject to DORA or NIS2, implementing the TPRM programme eliminates the risk of regulatory sanction for non-compliance with supply chain risk management requirements.
Frequently asked questions about DORA, NIS2, and supplier risk
The contractual framework with critical suppliers is the most underestimated protection instrument. Contracts with large technology providers (cloud, SaaS, data processors) are often adhesion contracts that the provider presents without negotiation. However, in many cases it is possible to negotiate additional security, audit, and continuity clauses — particularly when contract volume justifies it. And in every case, the contract must include exit clauses that allow the company to migrate to an alternative provider without the current provider blocking the transition by retaining data or technical documentation. Continuous monitoring transforms TPRM from a point-in-time exercise into a permanent operational capability: a supplier with an adequate security posture today may suffer an incident tomorrow, and early detection is what enables proactive decisions before the problem affects operations.
Third-party risk management in the Spanish business context
Third-party risk management (TPRM) is the systematic process of identifying, assessing, and managing the risks that arise from a company’s relationships with its suppliers, contractors, partners, and other third parties. As business models have become more interconnected — through outsourcing, SaaS platforms, cloud services, supply chains, and commercial partnerships — the concentration of risk in third-party relationships has grown substantially.
The regulatory environment has reinforced this priority: the EU’s DORA regulation (Digital Operational Resilience Act, effective January 2025) requires financial sector entities to implement comprehensive ICT third-party risk management; the CSDDD (Corporate Sustainability Due Diligence Directive) requires companies above applicable thresholds to conduct human rights and environmental due diligence across their supply chains; and the NIS2 Directive extends cybersecurity supply chain risk requirements to essential and important entities. Spain’s national Esquema Nacional de Seguridad (ENS) imposes equivalent requirements on entities operating with the public administration.
The TPRM lifecycle
Our third-party risk management framework covers the full vendor lifecycle:
1. Third-party inventory and categorisation: establishing a complete inventory of third-party relationships, categorised by criticality (what would happen if this third party failed or was compromised?), data access (does this third party have access to personal data, sensitive commercial data, or critical IT systems?), and regulatory exposure (is this third party subject to their own regulatory obligations that affect our risk?).
2. Pre-engagement due diligence: for new third parties, conducting risk-proportionate due diligence before the relationship begins. For critical or data-intensive relationships, this includes: financial stability assessment, cybersecurity posture review (questionnaire, SOC2 report, or on-site assessment), AML screening, sanctions screening, and operational resilience assessment.
3. Contractual risk allocation: ensuring that contracts with third parties include appropriate risk allocation clauses — data protection requirements (processor agreements under GDPR), cybersecurity obligations, business continuity requirements, audit rights, and termination rights triggered by defined risk events.
4. Ongoing monitoring: third-party risk does not end at contract signature. Ongoing monitoring includes: periodic performance and compliance reviews, external risk signal monitoring (credit events, regulatory sanctions, adverse media, cybersecurity incidents), and trigger-based re-assessment for material changes in the third party’s circumstances.
5. Exit planning: for critical third parties, maintaining a credible exit plan — the ability to switch to an alternative provider or in-source the activity within an acceptable timeframe — is a key resilience requirement. Over-dependence on a single critical supplier without an exit plan creates a structural vulnerability that regulators and auditors increasingly scrutinise.
Concentration risk and supply chain disruption
For Spanish manufacturing, logistics, and agri-food businesses, supply chain concentration risk — dependence on a small number of critical suppliers, geographic concentration in specific regions or countries, or single-source components — is often the most material third-party risk. The 2024 DANA floods disrupted supply chains throughout south-east Spain, demonstrating the real-world cost of geographic concentration.
Our supply chain risk assessment identifies concentration dependencies, quantifies the potential disruption cost, and designs mitigation strategies — alternative supplier qualification, inventory buffer strategies, geographic diversification — that are commercially feasible and proportionate to the risk.
Contact our TPRM team for a third-party risk diagnostic and programme design.
Real results in third-party risk management
Our main cloud service provider suffered an 18-hour outage that left us without critical operations. When we reviewed the contract we discovered the SLA entitled us to a negligible credit and there was no continuity clause at all. BMC renegotiated all our critical supplier contracts and implemented a monitoring programme that now gives us real-time visibility on every supplier's status.
Experienced team with local insight and international reach
What our TPRM service includes
Third-party inventory and classification
Identification and classification of all third parties with access to critical systems, data, or processes, prioritised by criticality and potential risk level.
Critical supplier due diligence
Structured assessment of critical suppliers: cybersecurity, business continuity, regulatory compliance, financial stability, and operational references. Includes questionnaires, certification review, and on-site audits.
Contractual framework and SLAs
Review and strengthening of contractual frameworks with critical suppliers: security, continuity, audit, incident notification clauses, SLAs with penalties, and exit and transition conditions.
Continuous third-party monitoring
Continuous monitoring system: risk alert tracking, periodic assessment reviews, third-party incident management, and supplier risk register updates.
Exit strategies and transition planning
Design of exit strategies for critical suppliers: migration plan documentation, pre-qualification of alternatives, and transition management when exit is activated.
Results that speak for themselves
Spanish subsidiary formation for foreign company
Fully operational subsidiary in 30 days with 12 employees hired, active bank accounts, and complete regulatory compliance.
Full formation package for a fintech startup: operational in 10 business days
Company operational in two weeks. Shareholders' agreement with vesting protecting all founders. PSD2 regulatory roadmap defined with three licensing options clearly scoped.
CSRD readiness for a mid-size energy group: first ESRS sustainability report
Company CSRD-ready six months ahead of the first reporting deadline. Double materiality assessment completed, ESG data collection framework implemented, 15 senior managers trained.
Reference guides
Company formation in Las Palmas — the EU business hub with a 4% corporate tax rate
Set up a company in Las Palmas de Gran Canaria. ZEC 4% corporate tax, SL incorporation, autonomous registration and full business setup for foreign entrepreneurs.
View guideSet up your company in Spain without the hassle
Comprehensive guidance for setting up your company in Spain with professional advisory. We handle every step of the incorporation process so you can focus on your business.
View guideGo self-employed in Spain without the bureaucratic nightmare
Everything a foreigner needs to freelance legally in Spain: NIE, autónomo registration, social security, and quarterly taxes. BMC handles the setup and ongoing compliance so you can focus on your work.
View guideHire in Spain without a costly legal entity setup mistake
Expanding to Spain? BMC helps foreign companies hire their first Spanish employee legally — from entity setup or EOR evaluation to payroll, contracts, and full employment law compliance.
View guideRegister your Spanish LLC (SL) — end-to-end, 10 business days
Spain does not have an LLC — but the Sociedad Limitada (SL) is the exact equivalent. BMC registers your Spanish SL end-to-end: legal advice, articles, notary, registry, NIF, and bank account in 10 business days.
View guideOutsource your accounting and focus on growing your business
Outsource your accounting to certified professionals. Cut costs, save time, and gain real-time financial visibility.
View guideAnalysis and perspectives
Frequently asked questions about DORA, NIS2, and supplier risk
Start with a free diagnostic
Our team of specialists, with deep knowledge of the Spanish and European market, will guide you from day one.
Third-Party Risk Management
Operations
First step
Start with a free diagnostic
Our team of specialists, with deep knowledge of the Spanish and European market, will guide you from day one.
Request your diagnostic
You may also be interested in
Business Continuity Planning
ISO 22301 business continuity planning: business impact analysis, BCP and DRP development, crisis management, tabletop exercises, and supply chain resilience.
Saber másEnterprise Risk Management
COSO ERM framework: risk appetite, risk registers, KRIs, board risk reporting, and integration of operational, strategic, financial, and compliance risk.
Saber másAnti-Money Laundering (AML)
AML/CFT compliance programme for entities subject to Spain's Law 10/2010: policies, procedures, training, and SEPBLAC liaison.
Saber másData Protection & Privacy
GDPR and LOPDGDD compliance, outsourced DPO, and comprehensive privacy management for businesses.
Saber másKey terms
Anti-Money Laundering (AML)
Anti-money laundering (AML) refers to the legal obligations, internal procedures and controls that…
Read definitionCorporate Governance in Spain
Corporate governance in Spain refers to the system of rules, practices, and processes by which…
Read definitionDORA (Digital Operational Resilience Act)
DORA (Regulation EU 2022/2554) is the EU's regulatory framework requiring financial sector entities…
Read definitionDue Diligence
Due diligence is the structured investigation and analysis of a target company or asset before a…
Read definitionEnterprise Risk Management (ERM)
Enterprise Risk Management (ERM) is a structured, organisation-wide process for identifying,…
Read definitionESG and Sustainability Reporting
ESG (Environmental, Social, and Governance) refers to the three dimensions of sustainability used to…
Read definition