Skip to content
Case studiesPricingSecurityCompareBlog

Europe

Americas

Oceania

Compliance9 min read

Third-Party Risk Management (TPRM): Complete Guide

Master third-party risk management (TPRM): APRA CPS 230 compliance, AUSTRAC expectations, vendor assessment

CheckFile Team
CheckFile Teamยท
Illustration for Third-Party Risk Management (TPRM): Complete Guide โ€” Compliance

Summarize this article with

Third-party risk management (TPRM) is the structured process organisations use to identify, assess, monitor, and mitigate risks arising from their relationships with external vendors, suppliers, and service providers. 35.5% of data breaches originate from the supply chain, and Australian regulators are tightening requirements. APRA has published new operational risk management requirements under Prudential Standard CPS 230 (effective 1 July 2025), and AUSTRAC expects reporting entities to assess and manage AML/CTF risks introduced by third-party arrangements. Organisations that treat TPRM as a point-in-time compliance exercise will not survive a 2026 supervisory review.

This guide sets out what an effective TPRM programme looks like, how Australian regulatory frameworks define your obligations, and the practical steps to build a programme that satisfies both your board and your regulator.

This article is for informational purposes only and does not constitute legal, financial, or regulatory advice.

What is third-party risk management in practice?

Third-party risk management (TPRM) covers the full lifecycle of every external relationship: pre-engagement due diligence, contractual protections, ongoing monitoring, and structured offboarding. It addresses risks far broader than cybersecurity alone.

APRA's Prudential Standard CPS 230 (Operational Risk Management) makes clear that APRA-regulated entities cannot outsource accountability for managing material service provider risks (APRA CPS 230). The same principle is embedded in AUSTRAC's expectations for reporting entities.

TPRM risk categories span the full vendor lifecycle:

Risk Category Examples
Operational risk Service disruption, vendor insolvency, capacity failure
Cyber and ICT risk Supply chain attack, data breach via vendor access
Concentration risk Over-reliance on a single cloud hyperscaler or software provider
Compliance risk Privacy Act violations, sanctions breaches, AML gaps at the vendor
Reputational risk Vendor misconduct affecting the organisation's brand
Geopolitical risk Vendors operating in sanctioned or high-risk jurisdictions

Regulatory framework: APRA and AUSTRAC requirements

APRA expectations in 2026

APRA published Prudential Standard CPS 230 (Operational Risk Management), effective from 1 July 2025 (APRA CPS 230), which establishes comprehensive requirements for the management of material service providers. Under CPS 230, APRA-regulated entities must:

  • Identify material service providers: Entities must maintain a register of all material service providers and assess the materiality of each arrangement.
  • Conduct pre-engagement due diligence: Before entering into a material outsourcing arrangement, entities must conduct appropriate due diligence.
  • Include mandatory contractual provisions: Contracts with material service providers must include audit rights, performance standards, notification requirements, and exit strategies.
  • Maintain board accountability: The board is ultimately responsible for the entity's service provider management framework. Accountability cannot be delegated or outsourced.
  • Monitor continuously: APRA expects ongoing monitoring of material service providers, not just annual assessments.

CPS 230 also introduces specific requirements for critical operations and tolerance levels -- entities must demonstrate that they can continue to deliver critical operations within tolerance levels, including when material service providers fail or are disrupted.

AUSTRAC expectations for reporting entities

AUSTRAC expects reporting entities under the AML/CTF Act 2006 to assess and manage ML/TF risks introduced by third-party arrangements, particularly where third parties are involved in customer onboarding, transaction processing, or record keeping (AUSTRAC AML/CTF Program Guidance).

ASIC and cyber resilience

ASIC has signalled that cyber resilience of third-party service providers is a supervisory priority. Following successful enforcement action against RI Advice Group for failure to manage cybersecurity risks (including risks arising from third-party IT providers), ASIC expects all AFSL holders to assess and manage cyber risks across their supply chains.

Building a TPRM programme: the five core stages

Stage 1: Inventory and tiering

No TPRM programme can function without an accurate, up-to-date inventory of all third parties. Industry data shows organisations manage an average of 286 vendors (Whistic, 2025), yet only a fraction receive meaningful risk scrutiny.

Tiering categorises every vendor by potential impact:

  • Critical / Material: Vendors supporting critical operations or material outsourcing arrangements, with access to sensitive data or high operational dependency.
  • High: Significant impact if disrupted; limited data access.
  • Standard: Peripheral services; low operational impact.

Tier determines the depth of due diligence, assessment frequency, and contractual protections required.

Stage 2: Pre-engagement due diligence

Pre-contract due diligence for critical vendors must cover:

  • Financial stability (audited accounts, credit ratings, insurance coverage).
  • Security posture (ISO 27001, SOC 2 Type II, IRAP assessment, penetration testing results).
  • Regulatory compliance status (Privacy Act, AML/CTF Act, sector-specific regulations).
  • Business continuity and disaster recovery capability.
  • References from regulated financial institutions.

CheckFile automates the collection and verification of vendor-supplied documents during this stage -- certifications, audited accounts, insurance certificates -- flagging missing or expired items automatically and reducing the manual burden on compliance teams.

Stage 3: Contractual protections

Critical vendor contracts must include the clauses specified in APRA CPS 230 for APRA-regulated entities. Minimum requirements include:

  • Precise service scope and performance standards.
  • Audit and inspection rights for the entity and its regulators (including APRA's right to access).
  • Major incident notification within agreed timeframes.
  • Data sovereignty provisions -- data must remain in Australia where required.
  • Exit plan with documented timelines and transition support obligations.
  • Sub-outsourcing controls -- the vendor cannot sub-contract critical functions without prior approval.

Stage 4: Continuous monitoring

70% of functional stakeholders lack visibility into third-party risks (Gartner, 2025). Continuous monitoring -- not annual questionnaires -- is what separates mature TPRM programmes from box-ticking exercises.

Effective ongoing monitoring includes:

  • Periodic re-assessments scaled to vendor criticality (quarterly for critical, annually for standard).
  • Real-time external security ratings (attack surface monitoring).
  • Financial health monitoring for critical vendors.
  • Tracking regulatory and geopolitical changes affecting vendors.
  • Automated alerting for contract expiry, certification lapse, and SLA breaches.

Using CheckFile's document monitoring features ensures your compliance team receives immediate alerts when a vendor's certificate of insurance, ISO certification, or regulatory licence approaches expiry.

Stage 5: Incident response and exit strategies

APRA CPS 230 requires documented, tested exit strategies for material service providers. This is not a theoretical exercise: APRA supervisors will ask to see evidence that exit plans have been rehearsed.

An exit strategy should include:

  • Identified alternative providers or internalisation options.
  • Documented data migration and system transition steps.
  • Notice period provisions calibrated to transition complexity.
  • A full register of system dependencies and data flows.

Explore further

Discover our practical guides and resources to master document compliance.

Explore our guides

Common TPRM pain points -- and how practitioners address them

Forums in the compliance and risk management community consistently surface the same operational challenges:

Challenge 1: Getting the right documentation from vendors. 48% of TPRM teams cite this as their top obstacle. Many vendors, particularly smaller ones, lack structured compliance programmes and struggle to produce the documentation required. Automated document collection platforms eliminate the back-and-forth email chains that consume compliance team capacity.

Challenge 2: Understaffing. 62% of risk and security leaders report their TPRM function is not sufficiently resourced, with teams managing an average of 33.6 vendors per risk professional. Automation is not optional at this ratio -- it is the only way to maintain programme quality.

Challenge 3: Executive buy-in. Only 40% of companies regularly report on third-party risk to their board. The business case is straightforward: the average cost of a data breach reached USD 4.88 million in 2024 (IBM Cost of a Data Breach Report 2024), and APRA can take enforcement action for failures in operational risk management.

Challenge 4: Fourth-party risk. Your vendor's vendors introduce risks you have no direct visibility into. A mature TPRM programme addresses this by requiring vendors to impose equivalent standards on their own critical sub-contractors.

For a broader view of how TPRM fits into your organisation's governance framework, see our GRC guide.

TPRM programme checklist

A mature TPRM programme includes the following elements:

  • Written TPRM policy approved by the board.
  • Complete, up-to-date inventory of all third parties with criticality tier.
  • Tiered due diligence questionnaires scaled to risk level.
  • Register of material service providers compliant with APRA CPS 230.
  • Contracts for critical vendors including CPS 230-equivalent clauses.
  • Documented continuous monitoring process.
  • Tested exit strategies for critical vendors.
  • Annual TPRM report presented to the board or risk committee.
  • Concentration risk map.
  • Incident response procedure for third-party-triggered events.

CheckFile supports the documentary evidence requirements of your TPRM programme -- from initial vendor due diligence through to ongoing monitoring and audit readiness.

For more detail on building your compliance documentation programme, see our document compliance guide.

For a comprehensive overview, see our document compliance complete guide. Our platform processes over 180,000 compliance documents per month with 98.7% OCR accuracy and a 94.8% fraud detection rate, maintaining 99.97% availability.

FAQ

What is third-party risk management (TPRM)?

TPRM is the structured process of identifying, assessing, and managing risks introduced by vendors, suppliers, and service providers. It covers operational, cyber, compliance, reputational, concentration, and geopolitical risks across the entire third-party lifecycle.

What is third-party risk management in banking in Australia?

In Australian banking, TPRM is a regulatory requirement enforced by APRA under CPS 230 and monitored by AUSTRAC for AML/CTF compliance. Banks must maintain registers of material service providers, conduct due diligence before engaging critical vendors, include mandatory contractual protections, and demonstrate continuous monitoring. Board-level accountability is non-negotiable.

What is a third-party risk management framework?

A TPRM framework is the governance structure -- policy, process, tools, and responsibilities -- within which the organisation identifies and manages third-party risks. A mature framework covers all five lifecycle stages: inventory and tiering, pre-engagement due diligence, contractual protections, ongoing monitoring, and exit strategy.

How often should vendor risk assessments be conducted?

Assessment frequency should be proportionate to vendor criticality. Critical vendors supporting material operations typically require quarterly reviews and continuous external monitoring. Standard vendors may be assessed annually. Trigger events -- major incidents, financial distress, regulatory changes -- should prompt immediate reassessment regardless of tier.

What are the penalties for failing to manage third-party risk under APRA CPS 230?

APRA has broad enforcement powers for non-compliance with prudential standards, including the ability to issue directions, impose conditions on licences, and take court-enforceable action. For significant failures in operational risk management, APRA can impose additional capital requirements or restrict business activities. The reputational and financial consequences of a major third-party incident typically far exceed any regulatory penalty.


This article is for informational purposes only and does not constitute legal, financial, or regulatory advice. Consult a qualified professional for your specific circumstances.

Stay informed

Get our compliance insights and practical guides delivered to your inbox.

Explore further

Discover our practical guides and resources to master document compliance.