Domain 5: Security Program Management and Oversight Module 41 of 61

Third-Party and Supply Chain Risk

Security+ Domain 5 — Security Program Management and Oversight A — Governance and Risk 14–18 minutes

What the Exam Is Really Testing

In 2020, a supply chain attack through a single IT management vendor compromised thousands of organizations — including federal agencies. The attackers did not need to breach those organizations directly. They compromised one vendor, and the vendor's own update mechanism delivered the malware. That is supply chain risk in practice.

Your security is only as strong as your weakest vendor. Third-party risk management ensures that external relationships do not create uncontrolled exposure.

The exam presents scenarios where vendor relationships, supply chain dependencies, and contractual obligations intersect with security. You must identify the correct agreement type, the appropriate due diligence step, or the supply chain risk that a scenario describes.


Vendor Assessment and Due Diligence

Before engaging a vendor, the organization must evaluate the vendor's security posture. This is due diligence — the process of investigating a potential partner before entering a business relationship.

Due diligence includes:

  • Reviewing the vendor's security policies and certifications (SOC 2, ISO 27001)
  • Evaluating the vendor's incident response capabilities
  • Assessing financial stability to ensure the vendor will remain operational
  • Checking references from other clients
  • Reviewing audit reports and compliance attestations

Conflict of interest must be identified during vendor assessment. If someone involved in the vendor selection process has a financial or personal relationship with the vendor, it compromises the integrity of the assessment. The exam expects you to recognize conflict of interest as a governance risk.

Vendor questionnaires are standardized forms sent to vendors requesting information about their security controls, policies, and practices. They provide a structured way to evaluate and compare vendors. Common questionnaire frameworks include SIG (Standardized Information Gathering) and CAIQ (Consensus Assessment Initiative Questionnaire).

Rules of engagement define the boundaries of the relationship — what the vendor can and cannot do, how they access your systems, and what happens if they violate the agreement. These are established before work begins and documented in contracts.


Ongoing Vendor Monitoring

Due diligence does not end after vendor selection. Vendors must be monitored continuously throughout the relationship.

Ongoing monitoring includes:

  • Regular security assessments and audits of vendor practices
  • Reviewing vendor compliance with contractual obligations
  • Monitoring vendor security incidents and breach disclosures
  • Tracking changes in the vendor's financial stability or ownership

Performance metrics measure whether the vendor is meeting its obligations. These include uptime percentages, response times, incident resolution times, and compliance rates.

SLA compliance tracking verifies that the vendor is meeting the service levels defined in the agreement. If the SLA guarantees 99.9% uptime and the vendor delivers 99.5%, there is a compliance gap that requires attention.

The exam tests whether you understand that vendor risk does not end at contract signing. It requires continuous management.


Agreement Types

The exam tests six types of agreements. Each serves a distinct purpose, and confusing them is a common source of wrong answers.

Service Level Agreement (SLA) defines measurable performance expectations between a service provider and customer. SLAs specify uptime guarantees, response times, resolution times, and penalties for non-compliance. An SLA might state: "99.9% uptime with a 15-minute response time for critical incidents."

Memorandum of Understanding (MOU) is a broad agreement between parties that outlines the intent and general terms of a relationship. MOUs are typically not legally binding. They establish a framework for cooperation without the specificity of a formal contract.

Memorandum of Agreement (MOA) is similar to an MOU but more specific and often legally binding. An MOA defines the responsibilities of each party, the scope of the agreement, and the terms under which it operates. Think of an MOA as an MOU with teeth.

Master Service Agreement (MSA) is a comprehensive contract that establishes the overarching terms governing all future transactions between two parties. Individual projects or deliverables are then covered by separate statements of work (SOW) under the MSA umbrella. The MSA sets terms once; the SOW defines specific engagements.

Business Partners Agreement (BPA) defines the terms of a business partnership, including profit sharing, responsibilities, liability distribution, and decision-making authority. BPAs are used when two organizations share ownership or operational responsibility for a joint venture.

Non-Disclosure Agreement (NDA) protects confidential information shared between parties. NDAs establish what information is considered confidential, how it must be protected, and the consequences of unauthorized disclosure. NDAs are often the first agreement signed before any detailed discussions begin.

Statement of Work (SOW) defines the specific deliverables, timelines, milestones, and acceptance criteria for a particular engagement. It operates under the umbrella of an MSA and provides the detail needed to execute a specific project.


Supply Chain Risk

Supply chain risk extends beyond traditional vendor relationships to include the entire chain of suppliers, manufacturers, and distributors that produce the technology your organization depends on.

Hardware source authenticity is the risk that hardware components have been tampered with, counterfeited, or compromised during manufacturing or distribution. Counterfeit components may contain backdoors, function unreliably, or fail to meet security specifications. Organizations mitigate this risk by purchasing from authorized distributors, verifying hardware authenticity, and inspecting deliveries.

Software supply chain risk involves the libraries, frameworks, and dependencies that make up your software. A compromise in any component — from an open-source library to a commercial SDK — can introduce vulnerabilities into your application.

The Software Bill of Materials (SBOM) is a formal inventory of all components, libraries, and dependencies in a software product. An SBOM allows organizations to:

  • Identify which software components are in use
  • Quickly determine exposure when a vulnerability is discovered in a component
  • Track licensing obligations
  • Verify that no unauthorized or deprecated components are included

The SBOM has become critical for supply chain security. When a vulnerability like Log4Shell is discovered, organizations with SBOMs can immediately identify which products are affected. Without an SBOM, they must manually investigate every application.

Managed service providers (MSPs) introduce supply chain risk because they have privileged access to your systems. An MSP compromise is effectively a compromise of every client the MSP serves. The exam tests whether you recognize MSPs as a supply chain risk vector.


Vendor Risk in Cloud Environments

Cloud computing amplifies third-party risk because organizations cede physical control of their data and infrastructure to the cloud provider.

Key cloud vendor risks include:

  • Data residency — where the cloud provider physically stores your data, which affects regulatory compliance
  • Shared responsibility — understanding which security controls are the provider's responsibility and which are yours
  • Vendor lock-in — the difficulty of migrating away from a cloud provider, which creates dependency risk
  • Multi-tenancy — the risk that other customers on the same infrastructure could affect your security or availability
  • Provider outages — cloud service disruptions that affect your operations, emphasizing the need for SLAs and redundancy planning

The shared responsibility model is particularly important. In IaaS, you manage the OS and everything above it. In PaaS, the provider manages the OS and runtime. In SaaS, the provider manages nearly everything. The exam tests whether you know where responsibility shifts.


Pattern Recognition

When you see third-party risk questions, look for these patterns:

  • If the question mentions uptime guarantees or response times → SLA
  • If the question mentions general intent without binding terms → MOU
  • If the question mentions a binding agreement with specific responsibilities → MOA
  • If the question mentions overarching terms for multiple engagements → MSA
  • If the question mentions protecting shared confidential information → NDA
  • If the question mentions specific project deliverables and timelines → SOW
  • If the question mentions tracking software components → SBOM
  • If the question mentions hardware tampering in the supply chain → hardware source authenticity

Trap Patterns

The exam will try to mislead you with these common traps:

  • Confusing MOU with MOA. An MOU is typically non-binding and establishes intent. An MOA is more specific and often legally binding. The key differentiator is enforceability.
  • Confusing MSA with SOW. The MSA establishes overall terms for the relationship. The SOW defines specific project scope and deliverables. They work together but serve different purposes.
  • Assuming vendor selection ends the process. Due diligence is the beginning. Ongoing monitoring, SLA compliance tracking, and periodic reassessment continue throughout the relationship.
  • Ignoring MSP risk. Managed service providers have privileged access to client systems. A compromise of the MSP compromises all clients. Do not overlook MSPs as a supply chain risk.

Scenario Practice


Question 1

Two government agencies plan to share threat intelligence data. They need to outline the purpose, scope, and general responsibilities of each party, but the agreement does not need to be legally enforceable.

Which agreement type is MOST appropriate?

A. Service Level Agreement
B. Memorandum of Understanding
C. Non-Disclosure Agreement
D. Master Service Agreement

Answer & reasoning

Correct: B

An MOU outlines the intent and general terms of a cooperative relationship without being legally binding. It is appropriate when two parties need to establish a framework for collaboration without formal contractual obligations.


Question 2

A critical vulnerability is discovered in a widely used open-source logging library. The security team needs to determine which of the organization's applications are affected.

What resource would MOST efficiently enable this determination?

A. A vendor questionnaire sent to all software providers
B. A software bill of materials for each application
C. A penetration test of all production systems
D. A review of each application's source code repository

Answer & reasoning

Correct: B

An SBOM provides a complete inventory of all components, libraries, and dependencies in each application. When a vulnerability is discovered in a component, the SBOM immediately reveals which applications include that component, enabling rapid response without manual investigation.


Question 3

An organization's managed service provider suffers a security breach. The attackers used the MSP's remote management tools to access client networks. The organization discovers that its contract with the MSP did not address security incident notification requirements.

What should the organization do FIRST to prevent this gap in future vendor relationships?

A. Terminate all managed service provider contracts immediately
B. Implement network segmentation to isolate MSP access
C. Include security requirements and incident notification in vendor agreements
D. Replace the MSP with an in-house IT team

Answer & reasoning

Correct: C

The root cause is a gap in the vendor agreement. Including security requirements, incident notification obligations, and right-to-audit clauses in vendor contracts ensures that expectations are documented and enforceable. Network segmentation is a good control but does not address the contractual gap.


Key Takeaway

Third-party risk is your risk. Outsourcing a service does not outsource the responsibility for securing it. Vendor management requires due diligence before, during, and after the relationship.

Match the agreement type to the formality and purpose described in the scenario. Distinguish between pre-engagement diligence and ongoing monitoring. Identify whether the supply chain risk involves hardware, software, or service providers. Vendors extend your attack surface — agreements define the boundaries, and monitoring ensures those boundaries hold.

Section A Review Review: Governance and Risk