Risk Management

Vendor Risk in Practice: How to Assess Your Supply Chain

NIS2 requires supply chain security. Here's a practical guide to vendor assessment with a 5-step model and checklist for English organizations.

  1. 62%
    of cyberattacks come via the supply chain
    Ponemon Institute 2025
  2. Over
    Over 160,000 organizations across the EU are covered by NIS2's supplier requirements
    European Commission
  3. Supplier
    Supplier security is an explicit requirement in NIS2 Article 21
    NIS2 Directive

The majority of organizations have dozens or hundreds of suppliers with some form of access to systems or data. Each such connection is a potential attack vector. NIS2 recognizes this and therefore sets explicit requirements for supply chain security.

This isn’t about distrusting your partners — it’s about systematically managing a risk that is otherwise easily overlooked.

Reality check: According to the Ponemon Institute, 62% of cyberattacks come via the supply chain. Attackers know it’s often easier to breach through a smaller supplier than directly through the target organization.

What does NIS2 require?

NIS2 Article 21 — Supply Chain Security:

Organizations shall take appropriate measures to manage cybersecurity risks related to the supply chain, including:

  • Security-related aspects of relationships with suppliers
  • Security quality of suppliers’ products and services
  • Cybersecurity practices of suppliers, including their development processes
  • Vulnerability management and disclosure

5-step model for supplier assessment

  1. Inventory and categorize Start by listing all suppliers that have access to systems, data or premises. Categorize them by criticality: Critical (business impact if unavailable), High (significant impact), Medium, Low. Focus on critical and high categories first.
  2. Define requirements per category Different suppliers require different levels of security requirements. A critical cloud provider requires comprehensive requirements, while an office supplier requires less. Create requirement levels proportional to risk.
  3. Conduct assessment Use questionnaires, request documentation, and where necessary conduct audits. Focus on: security policies, incident management, access control, encryption, backup and business continuity.
  4. Update contracts Ensure contracts contain security requirements, incident reporting (supplier must notify you of incidents), right to audit, sub-supplier requirements, and liability for security breaches.
  5. Monitor continuously Supplier assessment is not a one-off activity. Establish regular follow-up, monitor suppliers' security status and respond to changes in the risk landscape.

What should be assessed?

Security capability

AreaQuestions to ask
PoliciesAre there documented security policies? How often are they updated?
CertificationsDoes the supplier have ISO 27001 or similar? Is the certificate valid?
Incident managementHow quickly can they report incidents to you? Have they tested their plan?
Access controlHow is access to your systems/data managed? Is access logged?
EncryptionIs data encrypted in transit and at rest? What standards are used?
BackupHow is your data backed up? Is recovery tested?
Sub-suppliersWhich sub-suppliers are used? How are they controlled?

Red flags

No documented policies

A supplier that cannot produce basic security documentation likely lacks mature security governance.

Refuses audit

If a supplier categorically refuses to provide insight or answer questions, it's a warning sign. Legitimate suppliers understand the need.

Unclear incident management

If the supplier cannot describe how they would notify you of an incident, you cannot meet your own reporting requirements.

Extensive sub-suppliers

If the supplier uses many sub-suppliers without control, the risk chain extends uncontrolled.

Supplier contract checklist

Security requirements:

  • Reference to organization’s security policy
  • Specific technical requirements (encryption, access control, etc.)
  • Personnel training requirements
  • Security incident reporting requirements

Incident management:

  • Obligation to report incidents within [X] hours
  • Contact channels and escalation process
  • Obligation to assist with investigation
  • Liability for costs arising from incidents

Audit and oversight:

  • Right to conduct security audits
  • Access to relevant logs and reports
  • Obligation to inform about changes
  • Requirement to provide certificates and attestations

Sub-suppliers:

  • Requirement for approval of sub-suppliers
  • Same security requirements apply down the chain
  • List of approved sub-suppliers

Termination:

  • How data is returned or destroyed
  • Timeframe for transition
  • Continued confidentiality after termination

Questions to ask suppliers

Initial screening

  1. Do you have a documented information security policy?
  2. Do you have any security certifications (ISO 27001, SOC 2, etc.)?
  3. How do you handle security incidents?
  4. How do you protect data you handle on customers’ behalf?
  5. Which sub-suppliers do you use?

In-depth assessment (critical suppliers)

  1. Can we receive copies of relevant policies and procedures?
  2. When was your last penetration test conducted? Can we see the report?
  3. How do you handle vulnerability patching? What SLAs do you have?
  4. How is access to our systems/data logged and monitored?
  5. What are your RTO and RPO for services to us?
  6. Have you conducted incident exercises in the past year?

Common challenges and solutions

Hundreds of suppliers

Solution: Prioritize based on criticality and risk. Start with the 10-20 most important. Use self-declarations for lower risk levels.

Supplier refuses requirements

Solution: Evaluate alternative suppliers. If switching isn't possible, implement compensating controls and document risk acceptance.

Resource constraints

Solution: Automate where possible. Use standard questionnaires and vendor management tools.

Sub-supplier chain

Solution: Require visibility into sub-suppliers and demand the same standards apply down the chain.

How Securapilot can help

Securapilot’s vendor management module streamlines the entire process:

  • Supplier register — Centralized overview of all suppliers
  • Risk classification — Automatic categorization based on criticality
  • Questionnaires — Standardized assessment forms
  • Traceability — Complete history of assessments and decisions
  • Reminders — Automatic follow-up notifications
  • Reports — Export status for management and audit

Book a demo and see how we can help you take control of supplier risks.


Frequently asked questions

Which suppliers must we assess under NIS2?

Focus on suppliers that have access to your systems, handle your data, or deliver services critical to your operations. This includes IT suppliers, cloud services, operational partners and others with privileged access.

What should be included in supplier contracts under NIS2?

Contracts should contain security requirements appropriate to risk level, incident reporting requirements, right to audit, requirements for sub-supplier control, and clear responsibility allocation for security incidents.

How often should suppliers be assessed?

Frequency depends on criticality and risk. Critical suppliers should be assessed annually, others at longer intervals. All suppliers should undergo initial assessment before contracts are signed.

What do we do if a supplier doesn't meet requirements?

Start with dialogue and remediation plan. If the supplier cannot or will not improve, consider changing suppliers or implementing compensating controls. Document your decisions and risk acceptance.


#vendor risk#NIS2#supply chain#risk management#vendor management#supplier security

We use anonymous statistics without cookies to improve the website. Read more