Supply Chain Risk Management
Annual vendor questionnaires are not enough. NIS2 and DORA demand continuous supply chain oversight. Fig provides real-time vendor risk scoring, shared control mapping, and automated monitoring across your entire supplier base.
Why Annual Questionnaires Fall Short
Point-in-time assessments create a false sense of security
Most organisations still rely on annual security questionnaires to assess vendor risk. A vendor completes a self-assessment form, someone reviews the responses, and the results are filed away for 12 months. This approach has three fundamental problems.
First, the assessment is outdated almost immediately. A vendor's security posture can change dramatically in the weeks and months following a questionnaire. Certifications expire, staff leave, new vulnerabilities emerge, and breaches occur. Your annual assessment captures none of this.
Second, self-assessment is inherently unreliable. Vendors have every incentive to present their security programme in the best possible light. Without independent verification or continuous evidence, you are relying on trust rather than data.
Third, questionnaires do not scale. An organisation with 50 vendors might manage annual questionnaires manually. An MSP managing supply chain risk across 200 clients, each with their own vendor relationships, simply cannot. The administrative burden becomes unmanageable, and critical vendors get the same level of scrutiny as low-risk ones.
NIS2 Supply Chain Requirements
What the directive requires and how Fig helps you comply
What NIS2 Mandates
NIS2 Article 21(2)(d) requires essential and important entities to implement "supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers."
This is not a suggestion. It is a legal obligation with potential penalties of up to 2% of global annual turnover for essential entities and 1.4% for important entities. Regulators expect to see documented evidence of supply chain risk management activities, not just policies.
The directive also requires organisations to consider "the vulnerabilities specific to each direct supplier and service provider" and "the overall quality of products and cybersecurity practices of their suppliers and service providers." This means vendor-specific risk assessment, not generic questionnaires.
How Fig Helps
The Shared Control Model
Security responsibilities are divided between you and each vendor. Map them explicitly.
Every vendor relationship involves a division of security responsibilities. Some controls belong entirely to your organisation: managing user access to vendor systems, configuring integration security settings, and monitoring data flows. Other controls belong entirely to the vendor: securing their internal infrastructure, patching their systems, and managing their own staff. And some controls are shared: data encryption, incident response coordination, and business continuity planning.
Your Controls
Access management, integration configuration, data classification, usage monitoring
Shared Controls
Data encryption, incident response, business continuity, compliance reporting
Vendor Controls
Infrastructure security, patch management, staff vetting, physical security
Fig maps these responsibilities explicitly for each vendor relationship. The platform ensures that every control has a clear owner and that shared responsibilities have documented expectations on both sides. This prevents the most common supply chain risk failure: controls that both parties assume the other is handling.
Vendor Risk Scoring Methodology
A transparent, weighted approach to quantifying third-party risk
Fig evaluates each vendor across eight risk dimensions. Each dimension is weighted according to its potential impact on your security posture. The resulting score provides a clear, comparable measure of vendor risk that updates continuously as new information becomes available.
| Factor | Weight | What We Evaluate |
|---|---|---|
| Security certifications held | High | ISO 27001, SOC 2, Cyber Essentials Plus, and other recognised certifications indicate a mature security programme. |
| Patch management cadence | High | How quickly does the vendor apply critical patches? Vendors with defined SLAs and evidence of compliance score higher. |
| Incident history and response | High | Past breach disclosures, response times, and remediation actions reveal operational resilience. |
| Data handling practices | Medium | Encryption standards, data residency, retention policies, and access controls applied to your data. |
| Business continuity planning | Medium | Documented and tested disaster recovery and business continuity plans with defined RPO and RTO targets. |
| Sub-processor management | Medium | How does the vendor manage its own supply chain? Fourth-party risk is increasingly important under NIS2. |
| Contractual security commitments | Medium | Security SLAs, breach notification timelines, audit rights, and liability provisions in vendor contracts. |
| Financial stability | Low | Vendor financial health affects their ability to invest in security and maintain service continuity. |
Frequently Asked Questions
Common questions about supply chain risk management and regulatory compliance
Take Control of Your Supply Chain Risk
Move beyond annual questionnaires to continuous vendor risk monitoring. Fig helps you meet NIS2 and DORA requirements with automated evidence collection and real-time risk scoring.