A lot of information is available about managing and monitoring high-risk vendors. Since these elevated-risk vendors can disrupt your business operations and pose a great deal of risk to your organization, they have traditionally received a lot of attention. But what about medium-risk vendors? What differentiates them, and how do you manage and monitor them?
The following tips will help you identify medium-risk vendors and manage them effectively.
High-risk vendors typically present a substantial amount of risk in multiple risk categories. In contrast, medium-risk vendors (also called moderate risk) may have elevated risks in a single risk category or multiple modest risks across several risk categories. It's important to understand that medium-risk vendors can handle important services, but they don’t access, process, transmit or store confidential information (PII or PHI), and are never customer-facing. In addition, a medium-risk vendor would only have limited access to your systems and facilities.
To illustrate scenarios involving medium-risk vendors, let's look at the following examples:
The vendor provides an important product or service to your organization in both scenarios. Still, losing the vendor wouldn't cause significant disruption to your operations and won't impact your customers.
Medium-risk vendors pose substantial risks to your organization, so you must ensure effective processes for identifying, assessing, mitigating, and monitoring those risks. Although medium-risk vendors don't require the same level of attention as high-risk vendors, performing due diligence on their risk practices and controls is important, as is setting a regular cadence for risk re-assessment. Regular performance and risk monitoring is essential as well.
Formal risk re-assessments and reviews can be conducted every 18 months, depending on the provided service or service. You should:
While medium-risk vendors may not carry the same level of risk as high-risk vendors, they still present significant risks that need to be identified, assessed, managed, and monitored. It’s ultimately up to your organization to determine how to identify medium-risk vendors and your organization must be prepared to explain and defend those decisions to auditors and examiners, no matter your methodology.