Skip to content
Third-Party Risk Management

Supply Chain Risk Management

Annual vendor questionnaires are not enough. NIS2 and DORA demand continuous supply chain oversight. Fig provides real-time vendor risk scoring, shared control mapping, and automated monitoring across your entire supplier base.

Why Annual Questionnaires Fall Short

Point-in-time assessments create a false sense of security

Most organisations still rely on annual security questionnaires to assess vendor risk. A vendor completes a self-assessment form, someone reviews the responses, and the results are filed away for 12 months. This approach has three fundamental problems.

First, the assessment is outdated almost immediately. A vendor's security posture can change dramatically in the weeks and months following a questionnaire. Certifications expire, staff leave, new vulnerabilities emerge, and breaches occur. Your annual assessment captures none of this.

Second, self-assessment is inherently unreliable. Vendors have every incentive to present their security programme in the best possible light. Without independent verification or continuous evidence, you are relying on trust rather than data.

Third, questionnaires do not scale. An organisation with 50 vendors might manage annual questionnaires manually. An MSP managing supply chain risk across 200 clients, each with their own vendor relationships, simply cannot. The administrative burden becomes unmanageable, and critical vendors get the same level of scrutiny as low-risk ones.

NIS2 Supply Chain Requirements

What the directive requires and how Fig helps you comply

What NIS2 Mandates

NIS2 Article 21(2)(d) requires essential and important entities to implement "supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers."

This is not a suggestion. It is a legal obligation with potential penalties of up to 2% of global annual turnover for essential entities and 1.4% for important entities. Regulators expect to see documented evidence of supply chain risk management activities, not just policies.

The directive also requires organisations to consider "the vulnerabilities specific to each direct supplier and service provider" and "the overall quality of products and cybersecurity practices of their suppliers and service providers." This means vendor-specific risk assessment, not generic questionnaires.

How Fig Helps

Maintains a complete register of all third-party relationships with criticality ratings
Maps security controls to NIS2 Article 21(2)(d) requirements specifically
Tracks vendor certifications and alerts you when they expire
Provides continuous risk scoring that updates automatically
Documents supply chain due diligence activities for regulatory audit
Considers sub-processor (fourth-party) risk as NIS2 requires
Generates compliance evidence packs on demand

The Shared Control Model

Security responsibilities are divided between you and each vendor. Map them explicitly.

Every vendor relationship involves a division of security responsibilities. Some controls belong entirely to your organisation: managing user access to vendor systems, configuring integration security settings, and monitoring data flows. Other controls belong entirely to the vendor: securing their internal infrastructure, patching their systems, and managing their own staff. And some controls are shared: data encryption, incident response coordination, and business continuity planning.

Your Controls

Access management, integration configuration, data classification, usage monitoring

Shared Controls

Data encryption, incident response, business continuity, compliance reporting

Vendor Controls

Infrastructure security, patch management, staff vetting, physical security

Fig maps these responsibilities explicitly for each vendor relationship. The platform ensures that every control has a clear owner and that shared responsibilities have documented expectations on both sides. This prevents the most common supply chain risk failure: controls that both parties assume the other is handling.

Vendor Risk Scoring Methodology

A transparent, weighted approach to quantifying third-party risk

Fig evaluates each vendor across eight risk dimensions. Each dimension is weighted according to its potential impact on your security posture. The resulting score provides a clear, comparable measure of vendor risk that updates continuously as new information becomes available.

FactorWeightWhat We Evaluate
Security certifications heldHighISO 27001, SOC 2, Cyber Essentials Plus, and other recognised certifications indicate a mature security programme.
Patch management cadenceHighHow quickly does the vendor apply critical patches? Vendors with defined SLAs and evidence of compliance score higher.
Incident history and responseHighPast breach disclosures, response times, and remediation actions reveal operational resilience.
Data handling practicesMediumEncryption standards, data residency, retention policies, and access controls applied to your data.
Business continuity planningMediumDocumented and tested disaster recovery and business continuity plans with defined RPO and RTO targets.
Sub-processor managementMediumHow does the vendor manage its own supply chain? Fourth-party risk is increasingly important under NIS2.
Contractual security commitmentsMediumSecurity SLAs, breach notification timelines, audit rights, and liability provisions in vendor contracts.
Financial stabilityLowVendor financial health affects their ability to invest in security and maintain service continuity.

Frequently Asked Questions

Common questions about supply chain risk management and regulatory compliance

Take Control of Your Supply Chain Risk

Move beyond annual questionnaires to continuous vendor risk monitoring. Fig helps you meet NIS2 and DORA requirements with automated evidence collection and real-time risk scoring.