Atlas Systems Named a Representative Vendor in 2025 Gartner® Market Guide for TPRM Technology Solutions → Read More
TPRM Glossary
A curated list of essential terms used across third-party risk and compliance practices.
An Advanced Persistent Threat (APT) is a long-term, stealth cyberattack in which an attacker gains unauthorized access and remains hidden inside a network.
Learn moreAdverse Media Monitoring is the continuous screening of public news sources to identify negative or high-risk information related to vendors, partners, or individuals.
Learn moreAI-Powered Risk Management uses artificial intelligence to automate, optimize, and scale the identification, scoring, and mitigation of risks across third-party ecosystems.
Learn moreAPIs for Vendor Data Exchange are standardized digital interfaces that enable secure, real-time data sharing between organizations and third-party vendors.
Learn moreAssessment Completion Metrics are performance indicators that measure the progress and completion rate of vendor risk assessments.
Learn moreAttestation is the formal declaration by a vendor or stakeholder confirming the accuracy and completeness of submitted risk, security, or compliance information.
Learn moreAudit findings are documented results from an internal or external audit that identify compliance gaps, control weaknesses, or areas of risk.
Learn moreAudit readiness is the state of being fully prepared to undergo internal or external audits with all required evidence, documentation, and processes in place.
Learn moreAuto-tiering is the automated process of assigning vendors to risk tiers based on predefined criteria such as data sensitivity, access level, or service criticality.
Learn moreAutomated credentialing is the process of using technology to verify, validate, and track vendor or individual qualifications without manual intervention.
Learn moreAutomated questionnaire distribution is the use of digital workflows to send, track, and manage vendor assessments without manual coordination
Learn moreAutomated risk assessment is the use of technology to evaluate third-party risk factors without manual intervention.
Learn moreAutomated risk scoring is the process of assigning numerical or categorical risk levels to vendors using predefined algorithms and data inputs.
Learn moreThe Bank Secrecy Act (BSA) is a U.S. law requiring financial institutions to assist in detecting and preventing money laundering and financial crimes.
Learn moreBehavioral risk insights analyze patterns in user or vendor behavior to identify emerging risks.
Learn moreBill C-11 is Canada’s Consumer Privacy Protection Act that updates national privacy rules for organizations handling personal data.
Learn moreA Business Associate Agreement is a contract required under HIPAA that governs how a vendor handles protected health information.
Learn moreA Business Continuity Plan outlines how an organization continues critical operations during disruptions
Learn moreBusiness Email Compromise is a targeted fraud attack where attackers impersonate executives or vendors to steal money or data.
Learn moreCompliance-as-a-Service delivers outsourced compliance functions through managed services and automation platforms.
Learn moreCCPA is a California privacy law granting consumers rights over how their personal information is collected and shared.
Learn moreA Cloud Access Security Broker is a security layer that enforces policies across cloud applications and services.
Learn moreCCPA and CPRA are California privacy laws that define consumer rights and strengthen data protection obligations.
Learn moreCompliance documentation includes all records, policies, assessments, and evidence that demonstrate adherence to regulations and controls.
Learn moreCompliance management is the structured approach to meeting regulatory, contractual, and internal policy obligations.
Learn moreA compliance monitoring tool tracks adherence to regulations, internal controls, and policy requirements across an organization.
Learn moreCompliance rate measures how many required controls, tasks, or obligations are completed or functioning correctly.
Learn moreConcentration risk occurs when too much dependency is placed on a single vendor, technology, region, or service.
Learn moreConfigurable dashboards allow users to customize views of risk, compliance, or operational data.
Learn moreA context-aware assessment evaluates risk or compliance findings based on the specific environment, use case, and operational conditions.
Learn moreContract Lifecycle Management manages the creation, negotiation, execution, and renewal of vendor or customer contracts.
Learn moreThe Control Effectiveness Index measures how well security or compliance controls are performing in practice.
Learn moreControl framework alignment ensures that organizational controls map to recognized standards such as NIST, ISO, or COBIT.
Learn moreControl inheritance occurs when an organization or vendor relies on controls implemented by another service provider.
Learn moreA control library is a centralized repository of security, compliance, and operational controls.
It standardizes expectations and supports assessments, testing, and audits.
Control mapping links controls to policies, regulations, or frameworks they support.
Learn moreCritical vendors provide services that are essential to business operations or regulatory obligations.
They require enhanced oversight, ongoing monitoring, and stronger contractual controls.
A cyber attack is an intentional attempt to breach systems, steal data, or disrupt operations.
Learn moreA cyber threat is any potential event or actor that could exploit vulnerabilities to harm systems or data.
Learn moreCybersecurity consists of technologies, processes, and controls that protect systems, networks, and data from cyber threats.
Learn moreCybersecurity ratings provide an external score of an organization’s security posture based on observable signals and risk indicators.
Learn moreA data breach occurs when unauthorized parties access, disclose, or steal sensitive information.
Learn moreA data collection portal is a centralized interface for gathering assessments, evidence, and documentation from stakeholders.
Learn moreData exfiltration is the unauthorized removal or transfer of data from a system.
Learn moreData integration consolidates information from multiple systems or sources into a unified view.
Learn moreA data leak is the unintended exposure of sensitive information due to misconfiguration or oversight.a
Learn moreData privacy risk is the potential for harm arising from misuse or improper handling of personal information.
Learn moreA DDoS attack overwhelms a system with excessive traffic to make it unavailable.
Learn moreA deliver icon is a visual indicator marking completion or delivery of a task or requirement.
Learn moreDigital risk refers to exposure created by digital technologies, cloud services, and interconnected ecosystems.
Learn moreDigital risk management manages the identification and mitigation of risks arising from digital technologies.
Learn moreThe DPDP Act is India’s privacy law governing how digital personal data is collected and used.
Learn moreA DDQ collects information about a vendor’s security, compliance, and operational controls.
Learn moreDynamic reporting produces real-time or interactive insights from continuously updated data.
Learn moreDynamic risk profiles update a vendor’s risk level based on new data, alerts, and events.
Learn moreEDR monitors endpoints for malicious behavior and responds to threats in real time.
Learn moreEngagement-level risk profiling evaluates risk based on the specific services, data types, and scope of a vendor engagement.
Learn moreAn enumeration attack gathers detailed system information to identify potential vulnerabilities.
Learn moreESG risk signals indicate environmental, social, or governance exposure associated with a vendor or third party.
Learn moreEssential Eight is an Australian cybersecurity framework recommending baseline mitigation strategies.
Learn moreEthics and compliance risk is the potential for violations of laws, regulations, or ethical expectations.
Learn moreEvidence collection gathers artifacts that demonstrate compliance with controls or regulatory obligations.
Learn moreException management tracks, reviews, and resolves deviations from required controls or policies.
Learn moreFCPA is a U.S. law that prohibits bribery of foreign officials and mandates accurate financial reporting.
Learn moreFedRAMP is the U.S. government program for standardized cloud security assessment and authorization.
Learn moreFFIEC Guidelines provide regulatory standards for financial institutions on risk, security, and oversight.
Learn moreFinancial risk is the potential for monetary loss due to market, credit, operational, or liquidity failures.
Learn moreFINRA regulates broker-dealers and enforces rules protecting investors in U.S. financial markets.
Learn moreA fourth-party is a vendor or subcontractor engaged by a third-party provider.
Learn moreFourth-party risk is exposure arising from a vendor’s subcontractors or downstream providers.
Learn moreA gap analysis identifies differences between current performance and required standards.
Learn moreGDPR is the EU’s comprehensive privacy law governing the processing of personal data.
Learn moreGeopolitical risk is exposure arising from political instability, international conflict, or regulatory changes.
Learn moreGLBA is a U.S. law requiring financial institutions to safeguard customer financial information.
Learn moreGRC is an integrated framework for managing governance, risk management, and compliance processes.
Learn moreA heat map visually represents risk severity using color-coded scoring.
Learn moreHIPAA is a U.S. law governing the privacy and security of protected health information.
Learn moreHuman-in-the-Loop involves human oversight or intervention in automated or AI-driven processes.
Learn moreIdentity and Access Management controls how users authenticate and access systems and data.
Learn moreAn impact-likelihood matrix plots risks based on probability and potential impact.
Learn moreIndicators of Attack signal malicious behavior patterns that suggest an active attack.
Learn moreInherent risk is the level of risk that exists before controls are applied.
Learn moreInitial due diligence evaluates a vendor’s controls, financial stability, and compliance posture before onboarding.
Learn moreInsider risk is exposure created by employees or authorized users who misuse access, intentionally or unintentionally.
Learn moreInternal controls testing evaluates whether organizational controls operate effectively.
Learn moreAn IDS monitors systems and networks for suspicious or malicious activity.
Learn moreISO 27001 is an international standard for information security management systems.
Learn moreIssue tracking manages, prioritizes, and resolves identified problems or risks.
Learn moreIT resilience is the ability of systems to withstand disruptions and maintain operations.
Learn moreKerberos authentication uses tickets and symmetric keys to verify identity securely across networks.
Learn moreA keylogger records keystrokes on a device, often for malicious purposes.
Learn moreKYC verifies customer identity and assesses risk to prevent fraud and financial crime.
Learn moreLegal risk arises from potential violations of laws, regulations, or contractual obligations.
Learn moreLicense and certification monitoring tracks required vendor credentials and renewal timelines.
Learn moreLDAP is a protocol used for accessing and managing directory information services.
Learn moreMalware is malicious software designed to damage, disrupt, or compromise systems.
Learn moreMetasploit is a penetration testing framework used to identify and exploit vulnerabilities.
Learn moreA mitigation workflow is the structured process for resolving risks, issues, or control gaps.
Learn moreNIST is the U.S. National Institute of Standards and Technology that publishes widely adopted security and risk management frameworks.
Learn moreOSINT collects publicly available information for threat, compliance, or reputational analysis.
Learn moreOperational risk is exposure from failed processes, systems, people, or external events.
Learn moreOSFI self assessments evaluate compliance with Canada’s financial regulatory expectations for risk management.
Learn moreOutdated vendor risk occurs when a vendor relies on obsolete technology, processes, or certifications.
Learn moreOutsourcing risk is exposure that results from delegating business processes or services to third parties.
Learn morePSD2 is an EU regulation governing payment services, security, and open banking requirements.
Learn morePCI DSS is a global standard for protecting payment card data.
Learn morePerformance monitoring tracks how well vendors meet service, operational, and contractual expectations.
Learn morePhishing is a social engineering attack that tricks users into revealing sensitive information or executing malicious actions.
Learn morePolicy and procedure review evaluates documentation for accuracy, relevance, and regulatory alignment.
Learn morePredictive risk modeling uses data, analytics, and patterns to forecast future risk levels.
Learn morePrivacy risk is exposure created by improper or non-compliant handling of personal data.
Learn moreProcurement risk management addresses risks associated with sourcing, acquiring, and contracting goods or services.
Learn moreA proxy server acts as an intermediary for requests between users and external systems.
Learn moreRansomware is malware that encrypts data and demands payment for restoration.
Learn moreA ransomware action plan outlines the steps for responding to and recovering from a ransomware incident.
Learn moreReal-time risk alerts notify stakeholders when new risk events or indicators occur.
Learn moreReal-time risk posture reflects a continuously updated view of an organization’s or vendor’s risk level.
Learn moreA regulatory evidence package compiles documentation required to demonstrate compliance during regulatory reviews.
Learn moreReputational risk is the potential for damage to public trust due to negative events or associations.
Learn moreResidual risk is the remaining risk after controls and mitigation measures have been applied.
Learn moreRisk appetite is the level of risk an organization is willing to accept to achieve objectives.
Learn moreA risk assessment identifies, analyzes, and evaluates risks associated with a vendor, system, or process.
Learn moreRisk domain mapping links risks to categories such as cyber, privacy, financial, or operational risk.
Learn moreRisk exposure is the potential impact and likelihood of a risk affecting the organization.
Learn moreThe risk lifecycle includes the stages of identifying, assessing, mitigating, monitoring, and retiring risks.
Learn moreA risk owner is the individual responsible for managing and accepting a specific risk.
Learn moreA risk posture score quantifies the overall level of risk associated with a vendor or system.
Learn moreRisk reduction over time tracks decreases in exposure due to remediation or improved controls.
Learn moreA risk scoring model quantifies risk using structured criteria and weighted metrics.
Learn moreRisk tiering categorizes vendors into levels based on inherent and residual risk.
Learn moreRisk-based vendor segmentation groups vendors by risk level rather than spend or category.
Learn moreRouting and escalation rules define how tasks, alerts, and approvals move through workflows.
Learn moreSanctions screening checks vendors against global sanctions lists to ensure compliance with legal restrictions.
Learn moreA SAQ is a vendor-completed questionnaire used to self-report controls and compliance posture.
Learn moreSOX is a U.S. law requiring financial reporting integrity and internal control effectiveness.
Learn moreSASE combines network security and connectivity into a cloud-delivered architecture.
Learn moreScalability metrics measure how well systems or vendors handle growth in demand, data, or users.
Learn moreSecurity controls testing validates whether controls prevent or detect threats effectively.
Learn moreA SOC is a centralized function that monitors, detects, and responds to security threats.
Learn moreA security questionnaire collects information about a vendor’s security controls and practices.
Learn moreSMB is a network protocol used for file sharing, printing, and communication between systems.
Learn moreThe SIG questionnaire is a standardized vendor assessment used to evaluate risk and compliance.
Learn moreA single-pane view consolidates data and insights into one unified interface.
Learn moreSLA enforcement ensures vendors meet contractual performance and service-level commitments.
Learn moreThe SLACIP Act is an Australian law focused on critical infrastructure security and resilience.
Learn moreSlow onboarding risk is exposure created when vendor activation or due diligence delays operations.
Learn moreSOC 1, SOC 2, and SOC 3 are audit reports evaluating vendor controls for financial reporting, security, privacy, and operations.
Learn moreSocial engineering manipulates people into revealing information or performing risky actions.
Learn moreSpring4Shell is a critical vulnerability in the Spring Framework that enables remote code execution.
Learn moreA stakeholder approval workflow routes assessments, risks, or changes to required approvers.
Learn moreStandard definitions ensure consistent terminology across risk, compliance, and governance processes.
Learn moreSupply chain risk is exposure arising from vulnerabilities in interconnected vendors and service providers.
Learn moreSurface web monitoring analyzes publicly accessible websites for risk or exposure.
Learn moreA system-of-record for risk is the authoritative source storing all risk data, decisions, and evidence.
Learn moreTask assignment allocates responsibilities for assessments, reviews, remediation, or approvals.
Learn moreA task automation engine automates repetitive workflows across risk and compliance processes.
Learn moreTermination risk is exposure created when ending a vendor relationship disrupts operations or compliance.
Learn moreCCPA is California’s privacy law governing how personal information is collected, used, and shared.
Learn moreGDPR is the EU’s privacy law governing personal data rights and processing requirements.
Learn moreGLBA is a U.S. law requiring financial institutions to protect customer financial information.
Learn moreA third-party is an external organization providing products or services to an enterprise.
Learn moreThird-party classification groups vendors based on their role, service type, or risk level.
Learn moreThird-party due diligence evaluates vendor risks before and during the relationship.
Learn moreThird-party evaluation assesses vendor performance, controls, and overall suitability.
Learn moreThird-party oversight ensures continuous monitoring and management of vendor risks.
Learn morePortfolio health reflects the overall risk, compliance, and performance status of all third-parties.
Learn moreThird-party registration captures vendor details and initializes onboarding workflows.
Learn moreTPRM is the program that identifies, assesses, and manages risks associated with third-party vendors.
Learn moreThird-party risk scoring quantifies vendor risk using structured metrics and criteria.
Learn moreThreat intelligence provides insights into current and emerging cyber threats that may affect systems or vendors.
Learn moreTiered due diligence applies different assessment levels based on vendor risk tier.
Learn moreTransaction monitoring tracks activities to detect fraud, anomalies, and suspicious behavior.
Learn moreTTP hunting searches for attacker tactics, techniques, and procedures in systems and environments.
Executive Order 14028 strengthens national cybersecurity requirements for federal systems and suppliers.
Learn moreUK-GDPR is the United Kingdom’s data protection law, aligned with the EU GDPR framework.
Learn moreA vendor is an external organization providing goods or services to a company.
Learn moreVendor assurance validates that vendors meet required security and compliance standards.
Learn moreVendor classification groups vendors based on function, service type, or operational role.
Learn moreVendor coverage rate measures how many vendors have completed assessments, evidence submissions, or monitoring requirements.
Learn moreVendor evaluation criteria are the standards used to assess a vendor’s capabilities, controls, and suitability.
Learn moreVendor governance oversees how vendors are managed, monitored, and held accountable.
Learn moreA vendor master file is the authoritative record of all vendor information maintained by an organization.
Learn moreVendor offboarding is the process of safely terminating a vendor relationship and removing access.
Learn moreVendor onboarding is the process of initiating a new vendor relationship, including due diligence and approvals.
Learn moreVendor performance risk is the potential for a vendor to fail to meet service, quality, or operational expectations.
Learn moreVendor portfolio segmentation groups vendors based on shared characteristics or risk levels.
Learn moreVendor relationship risk is exposure arising from dependency, misalignment, or instability in vendor relationships.
Learn moreA vendor risk assessment evaluates a vendor’s security, compliance, operational, and financial risks.
Learn moreVRM is the structured practice of identifying and managing risks posed by third-party vendors.
Learn moreA VRM program is the formal framework governing how vendor risks are evaluated and managed.
Learn moreVendor risk ratings quantify vendor risk into defined categories or scores.
Learn moreVendor tiering groups vendors into levels based on risk, criticality, or regulatory exposure.
Learn moreWatchlist monitoring checks vendors against sanction, criminal, regulatory, or enforcement lists.
Learn moreA web shell is malicious code that allows attackers remote access to a compromised web server.
Learn moreWorkflow orchestration automates and coordinates tasks across risk and compliance processes.
Learn moreZero Trust is a security model that assumes no implicit trust and verifies every access request.
Learn more