Maintain a critical-third-party register, with exit plans for each
Most large breaches start at a vendor you wouldn't have called critical. Maintain a register of who can hurt you, what data they hold, and how you survive when they fail.
- Quadrant
- Strategic move
- Ease
- 3 / 5
- Impact
- 4 / 5
- Control family
- Governance
- Cost band
- low
- Catalogued incidents
- 10
What the control is
A critical-third-party register is the live, owned, board-visible inventory of every supplier whose failure or compromise would materially impact your organisation. For each entry, the register names the vendor, the operational contact, the systems and data classes the vendor holds, the contractual data-handling and incident-notification obligations, the connection topology (network, OAuth, API, on-site), the regulated-data scope, and — distinctly — the exit plan. The exit plan is the documented, rehearsed procedure for replacing the vendor in a defined time window when the vendor fails for reasons inside or outside your control.
The control covers two failure modes that are increasingly conflated in third-party risk programmes. The first is the security failure: the vendor is breached and your data is exposed downstream. The second is the operational failure: the vendor is rendered inoperative — by ransomware, financial collapse, sanctions, or political event — and your operations stall until you replace them. Both are catalogue-evidenced. Both need the register and the exit plan.
Why it matters
The catalogue’s most damaging breaches of the last five years are overwhelmingly third-party. Salesloft Drift’s August 2025 OAuth-token theft cascaded into 40-plus downstream Salesforce-customer breaches across April 2026, including Pitney Bowes, Carnival, Medtronic, Mytheresa and Zara — none of those customers had the Drift integration on the critical-third-party register because Drift was a chat widget. MOVEit Transfer’s May 2023 mass-exploit by Cl0p hit hundreds of customer organisations in finance, payroll and HR — most of them had MOVEit on a register but not as critical, because it was “just a file-transfer appliance.” Kaseya VSA’s July 2021 supply-chain ransomware affected the customers of MSPs who themselves were managing thousands of small-business endpoints — a triple-tier dependency that nobody had walked end to end.
CDK Global (June 2024) put thousands of US auto dealerships into a multi-week outage because dealer-management was outsourced to one vendor with no exit plan. Change Healthcare (February 2024) disrupted clearing-house payments across the US healthcare system because most providers had not modelled what happened if their clearing-house failed. The 2026 Citizens Financial Group and Frost Bank shared-vendor breach is a banking-sector worked example: a single third-party vendor with print-and-tax-document obligations to two unrelated US banks, breached by Everest, with class actions filed within two weeks. The US Treasury BeyondTrust event of December 2024 is the same pattern in the federal-government space. Target 2013 — a fourteen-year-old example, still relevant — was an HVAC contractor.
Every one of these is a register-and-exit-plan failure. The question the control answers is not “could the vendor be breached.” Of course they can. The question is “do you know who they are, what they hold, and how you continue operating when they fail.”
Where the regulators sit
The UK Financial Conduct Authority’s Supervisory Statement SS2/21 (“Outsourcing and third-party risk management”) makes the register explicit and mandatory for FCA-regulated firms. The Bank of England’s PRA SS1/21 covers operational resilience in the same shape. The European Union’s Digital Operational Resilience Act (DORA) is the mandatory equivalent for EU financial entities from January 2025 and extends the register requirement with detailed notification, audit and exit-strategy obligations. NCSC’s supply-chain security guidance is the UK national-agency view for any sector; NIST SP 800-161 Rev. 1 (“Cybersecurity Supply Chain Risk Management Practices”) is the US foundational standard. ISO/IEC 27036 is the international standard for information security in supplier relationships and provides the governance vocabulary.
The framework view is unanimous and has been moving in the same direction for a decade. The post-Salesloft-Drift cluster has accelerated the regulatory attention.
Where it usually breaks
Two failure modes account for most thin third-party programmes. The first is scope: the register covers the named contractual relationships and misses the integration-level dependencies. Salesforce is on every register; the Drift OAuth integration is on almost none. SaaS-to-SaaS plumbing is the modern equivalent of the HVAC vendor. The fix is to extend the register to integrations and tokens, not just contracts.
The second is the exit plan. Most registers stop at the vendor record and never document the exit. The CDK Global outage was so painful precisely because the population of dealerships that had thought through “what do we do if CDK is offline for three weeks” was vanishingly small. The fix is mandatory exit-runbook authoring at vendor onboarding and at each annual review, with at least an annual tabletop exercise on the highest-impact vendors.
What good looks like
A live register of every critical third party — contractual and integration-level — with named owner, regulated-data scope, connection topology, and exit plan. Annual exit-plan tabletop exercise on the highest-tier vendors. SaaS-to-SaaS OAuth integrations inventoried and reviewed quarterly. Vendor concentration risk visible to the board. Contractual right of audit, incident-notification SLAs, data-retention limits and key-held-by-customer encryption where the data classification justifies it.
The cost is the governance time. The benefit is that the next Salesloft-Drift-shape event arrives at an organisation with a list, a clock and a runbook rather than a steering-committee meeting.
Where this control would have changed the outcome
- SalesLoft Drift OAuth supply-chain breach Stolen OAuth tokens from the Drift conversational marketing platform let attackers query Salesforce environments at major enterprises and exfiltrate CRM data at scale.
- MOVEit Transfer — Cl0p mass exploitation Cl0p exploited a SQL-injection zero-day in MOVEit Transfer before it was patched, silently exfiltrating data from over 2,600 organisations including US government agencies and major corporations.
- Kaseya VSA — REvil supply-chain ransomware REvil exploited a zero-day authentication bypass in Kaseya VSA to push ransomware through managed service providers to roughly 1,500 downstream businesses in July 2021.
- CDK Global — auto-dealer SaaS ransomware BlackSuit ransomware took CDK Global offline for two weeks, halting transactions at 15,000 North American auto dealerships; CDK reportedly paid a $25M ransom rather than rebuild from backup.
- Change Healthcare — ALPHV/BlackCat ransomware ALPHV ransomware took US healthcare-claims clearinghouse Change Healthcare offline for weeks, blocked a third of US claims processing, and exposed 190M individuals' health records.
- Citizens Financial Group and Frost Bank — shared-vendor Everest ransomware breach Everest ransomware compromised a shared third-party vendor handling statement printing for Citizens and tax document fulfilment for Frost, exposing roughly 3.65 million customer records.
- Pitney Bowes — Salesforce CRM phishing breach, ShinyHunters dump ShinyHunters publicly dumped 8.2 million Pitney Bowes customer records harvested from a Salesforce CRM compromised via a phishing-stolen employee email account.
- Carnival Corporation — Holland America Mariner Society phishing breach ShinyHunters publicly dumped 7.5 million unique Mariner Society loyalty-programme email addresses after Carnival refused extortion following a single-user phishing compromise.
- US Treasury — BeyondTrust supply-chain breach Silk Typhoon used a stolen BeyondTrust API key to access US Treasury workstations including those of the sanctions team at OFAC and the foreign-investment reviewers at CFIUS.
- Target Corporation — 2013 card breach Attackers entered Target's network through an HVAC supplier's stolen credentials, deployed memory-scraping malware on point-of-sale terminals, and exfiltrated 40M cards and 70M customer records.
Sources
- FCA — SS2/21: Outsourcing and third-party risk management // primary
- EU DORA — Digital Operational Resilience Act, ICT third-party risk management // primary
- NCSC — Supply chain security guidance // primary
- NIST SP 800-161 Rev. 1 — Cybersecurity Supply Chain Risk Management Practices // primary
- ISO/IEC 27036 — Information security for supplier relationships // primary