Atlas Systems Named a Representative Vendor in 2025 Gartner® Market Guide for TPRM Technology Solutions → Read More

TPRM Glossary

A curated list of essential terms used across third-party risk and compliance practices.

Advanced Persistent Threat (APT)

An Advanced Persistent Threat (APT) is a long-term, stealth cyberattack in which an attacker gains unauthorized access and remains hidden inside a network.

Learn more
Adverse Media Monitoring

Adverse Media Monitoring is the continuous screening of public news sources to identify negative or high-risk information related to vendors, partners, or individuals.

Learn more
AI-Powered Risk Management

AI-Powered Risk Management uses artificial intelligence to automate, optimize, and scale the identification, scoring, and mitigation of risks across third-party ecosystems.

Learn more
APIs for Vendor Data Exchange

APIs for Vendor Data Exchange are standardized digital interfaces that enable secure, real-time data sharing between organizations and third-party vendors.

Learn more
Assessment Completion Metrics

Assessment Completion Metrics are performance indicators that measure the progress and completion rate of vendor risk assessments.

Learn more
Attestation

Attestation is the formal declaration by a vendor or stakeholder confirming the accuracy and completeness of submitted risk, security, or compliance information.

Learn more
Audit Findings

Audit findings are documented results from an internal or external audit that identify compliance gaps, control weaknesses, or areas of risk.

Learn more
Audit Readiness

Audit readiness is the state of being fully prepared to undergo internal or external audits with all required evidence, documentation, and processes in place. 

Learn more
Auto-Tiering

Auto-tiering is the automated process of assigning vendors to risk tiers based on predefined criteria such as data sensitivity, access level, or service criticality.

Learn more
Automated Credentialing

Automated credentialing is the process of using technology to verify, validate, and track vendor or individual qualifications without manual intervention.

Learn more
Automated Questionnaire Distribution

Automated questionnaire distribution is the use of digital workflows to send, track, and manage vendor assessments without manual coordination

Learn more
Automated Risk Assessment

Automated risk assessment is the use of technology to evaluate third-party risk factors without manual intervention.

Learn more
Automated Risk Scoring

Automated risk scoring is the process of assigning numerical or categorical risk levels to vendors using predefined algorithms and data inputs.

Learn more
Bank Secrecy Act (BSA)

The Bank Secrecy Act (BSA) is a U.S. law requiring financial institutions to assist in detecting and preventing money laundering and financial crimes.

Learn more
Behavioral Risk Insights

Behavioral risk insights analyze patterns in user or vendor behavior to identify emerging risks.

Learn more
Bill C-11

Bill C-11 is Canada’s Consumer Privacy Protection Act that updates national privacy rules for organizations handling personal data.

Learn more
Business Associate Agreement (BAA)

A Business Associate Agreement is a contract required under HIPAA that governs how a vendor handles protected health information.

Learn more
Business Continuity Plan

A Business Continuity Plan outlines how an organization continues critical operations during disruptions

Learn more
Business Email Compromise (BEC)

Business Email Compromise is a targeted fraud attack where attackers impersonate executives or vendors to steal money or data.

Learn more
CaaS (Compliance-as-a-Service)

Compliance-as-a-Service delivers outsourced compliance functions through managed services and automation platforms.

Learn more
California Consumer Privacy Act (CCPA)

CCPA is a California privacy law granting consumers rights over how their personal information is collected and shared.

Learn more
CASB (Cloud Access Security Broker)

A Cloud Access Security Broker is a security layer that enforces policies across cloud applications and services.

Learn more
CCPA / CPRA

CCPA and CPRA are California privacy laws that define consumer rights and strengthen data protection obligations.

Learn more
Compliance Documentation

Compliance documentation includes all records, policies, assessments, and evidence that demonstrate adherence to regulations and controls.

Learn more
Compliance Management

Compliance management is the structured approach to meeting regulatory, contractual, and internal policy obligations.

Learn more
Compliance Monitoring Tool

A compliance monitoring tool tracks adherence to regulations, internal controls, and policy requirements across an organization.

Learn more
Compliance Rate

Compliance rate measures how many required controls, tasks, or obligations are completed or functioning correctly.

Learn more
Concentration Risk

Concentration risk occurs when too much dependency is placed on a single vendor, technology, region, or service.

Learn more
Configurable Dashboards

Configurable dashboards allow users to customize views of risk, compliance, or operational data.

Learn more
Context-Aware Assessment

A context-aware assessment evaluates risk or compliance findings based on the specific environment, use case, and operational conditions.

Learn more
Contract Lifecycle Management (CLM)

Contract Lifecycle Management manages the creation, negotiation, execution, and renewal of vendor or customer contracts.

Learn more
Control Effectiveness Index

The Control Effectiveness Index measures how well security or compliance controls are performing in practice.

Learn more
Control Framework Alignment

Control framework alignment ensures that organizational controls map to recognized standards such as NIST, ISO, or COBIT.

Learn more
Control Inheritance

Control inheritance occurs when an organization or vendor relies on controls implemented by another service provider.

Learn more
Control Library

A control library is a centralized repository of security, compliance, and operational controls.
It standardizes expectations and supports assessments, testing, and audits.

Learn more
Control Mapping

Control mapping links controls to policies, regulations, or frameworks they support.

Learn more
Critical Vendors

Critical vendors provide services that are essential to business operations or regulatory obligations.
They require enhanced oversight, ongoing monitoring, and stronger contractual controls.

Learn more
Cyber Attack

A cyber attack is an intentional attempt to breach systems, steal data, or disrupt operations.

Learn more
Cyber Threat

A cyber threat is any potential event or actor that could exploit vulnerabilities to harm systems or data.

Learn more
Cybersecurity

Cybersecurity consists of technologies, processes, and controls that protect systems, networks, and data from cyber threats.

Learn more
Cybersecurity Ratings

Cybersecurity ratings provide an external score of an organization’s security posture based on observable signals and risk indicators.

Learn more
Data Breach

A data breach occurs when unauthorized parties access, disclose, or steal sensitive information.

Learn more
Data Collection Portal

A data collection portal is a centralized interface for gathering assessments, evidence, and documentation from stakeholders.

Learn more
Data Exfiltration

Data exfiltration is the unauthorized removal or transfer of data from a system.

Learn more
Data Integration

Data integration consolidates information from multiple systems or sources into a unified view.

Learn more
Data Leak

A data leak is the unintended exposure of sensitive information due to misconfiguration or oversight.a

Learn more
Data Privacy Risk

Data privacy risk is the potential for harm arising from misuse or improper handling of personal information.

Learn more
DDoS Attack

A DDoS attack overwhelms a system with excessive traffic to make it unavailable.

Learn more
Deliver Icon

A deliver icon is a visual indicator marking completion or delivery of a task or requirement.

Learn more
Digital Risk

Digital risk refers to exposure created by digital technologies, cloud services, and interconnected ecosystems.

Learn more
Digital Risk Management

Digital risk management manages the identification and mitigation of risks arising from digital technologies.

Learn more
DPDP Act (India)

The DPDP Act is India’s privacy law governing how digital personal data is collected and used.

Learn more
Due Diligence Questionnaire (DDQ)

A DDQ collects information about a vendor’s security, compliance, and operational controls.

Learn more
Dynamic Reporting

Dynamic reporting produces real-time or interactive insights from continuously updated data.

Learn more
Dynamic Risk Profiles

Dynamic risk profiles update a vendor’s risk level based on new data, alerts, and events.

Learn more
Endpoint Detection and Response (EDR)

EDR monitors endpoints for malicious behavior and responds to threats in real time.

Learn more
Engagement-Level Risk Profiling

Engagement-level risk profiling evaluates risk based on the specific services, data types, and scope of a vendor engagement.

Learn more
Enumeration Attack

An enumeration attack gathers detailed system information to identify potential vulnerabilities.

Learn more
ESG Risk Signals

ESG risk signals indicate environmental, social, or governance exposure associated with a vendor or third party.

Learn more
Essential Eight

Essential Eight is an Australian cybersecurity framework recommending baseline mitigation strategies.

Learn more
Ethics & Compliance Risk

Ethics and compliance risk is the potential for violations of laws, regulations, or ethical expectations.

Learn more
Evidence Collection

Evidence collection gathers artifacts that demonstrate compliance with controls or regulatory obligations.

Learn more
Exception Management

Exception management tracks, reviews, and resolves deviations from required controls or policies.

Learn more
FCPA (Foreign Corrupt Practices Act)

FCPA is a U.S. law that prohibits bribery of foreign officials and mandates accurate financial reporting.

Learn more
FedRAMP

FedRAMP is the U.S. government program for standardized cloud security assessment and authorization.

Learn more
FFIEC Guidelines

FFIEC Guidelines provide regulatory standards for financial institutions on risk, security, and oversight.

Learn more
Financial Risk

Financial risk is the potential for monetary loss due to market, credit, operational, or liquidity failures.

Learn more
FINRA

FINRA regulates broker-dealers and enforces rules protecting investors in U.S. financial markets.

Learn more
Fourth-Party

A fourth-party is a vendor or subcontractor engaged by a third-party provider.

Learn more
Fourth-Party Risk

Fourth-party risk is exposure arising from a vendor’s subcontractors or downstream providers.

Learn more
Gap Analysis

A gap analysis identifies differences between current performance and required standards.

Learn more
GDPR (General Data Protection Regulation)

GDPR is the EU’s comprehensive privacy law governing the processing of personal data.

Learn more
Geopolitical Risk

Geopolitical risk is exposure arising from political instability, international conflict, or regulatory changes.

Learn more
GLBA (Gramm–Leach–Bliley Act)

GLBA is a U.S. law requiring financial institutions to safeguard customer financial information.

Learn more
Governance, Risk, and Compliance (GRC)

GRC is an integrated framework for managing governance, risk management, and compliance processes.

Learn more
Heat Map

A heat map visually represents risk severity using color-coded scoring.

Learn more
HIPAA

HIPAA is a U.S. law governing the privacy and security of protected health information.

Learn more
Human-in-the-Loop (HITL)

Human-in-the-Loop involves human oversight or intervention in automated or AI-driven processes.

Learn more
Identity & Access Management

Identity and Access Management controls how users authenticate and access systems and data.

Learn more
Impact-Likelihood Matrix

An impact-likelihood matrix plots risks based on probability and potential impact.

Learn more
Indicators of Attack (IOAs)

Indicators of Attack signal malicious behavior patterns that suggest an active attack.

Learn more
Inherent Risk

Inherent risk is the level of risk that exists before controls are applied.

Learn more
Initial Due Diligence

Initial due diligence evaluates a vendor’s controls, financial stability, and compliance posture before onboarding.

Learn more
Insider Risk

Insider risk is exposure created by employees or authorized users who misuse access, intentionally or unintentionally.

Learn more
Internal Controls Testing

Internal controls testing evaluates whether organizational controls operate effectively.

Learn more
Intrusion Detection System (IDS)

An IDS monitors systems and networks for suspicious or malicious activity.

Learn more
ISO/IEC 27001

ISO 27001 is an international standard for information security management systems.

Learn more
Issue Tracking

Issue tracking manages, prioritizes, and resolves identified problems or risks.

Learn more
IT Resilience

IT resilience is the ability of systems to withstand disruptions and maintain operations.

Learn more
Kerberos Authentication

Kerberos authentication uses tickets and symmetric keys to verify identity securely across networks.

Learn more
Keylogger

A keylogger records keystrokes on a device, often for malicious purposes.

Learn more
KYC (Know Your Customer)

KYC verifies customer identity and assesses risk to prevent fraud and financial crime.

Learn more
Legal Risk

Legal risk arises from potential violations of laws, regulations, or contractual obligations.

Learn more
License & Certification Monitoring

License and certification monitoring tracks required vendor credentials and renewal timelines.

Learn more
Lightweight Directory Access Protocol (LDAP)

LDAP is a protocol used for accessing and managing directory information services.

Learn more
Malware

Malware is malicious software designed to damage, disrupt, or compromise systems.

Learn more
Metasploit

Metasploit is a penetration testing framework used to identify and exploit vulnerabilities.

Learn more
Mitigation Workflow

A mitigation workflow is the structured process for resolving risks, issues, or control gaps.

Learn more
NIST

NIST is the U.S. National Institute of Standards and Technology that publishes widely adopted security and risk management frameworks.

Learn more
Open Source Intelligence (OSINT)

OSINT collects publicly available information for threat, compliance, or reputational analysis.

Learn more
Operational Risk

Operational risk is exposure from failed processes, systems, people, or external events.

Learn more
OSFI Self Assessments

OSFI self assessments evaluate compliance with Canada’s financial regulatory expectations for risk management.

Learn more
Outdated Vendor Risk

Outdated vendor risk occurs when a vendor relies on obsolete technology, processes, or certifications.

Learn more
Outsourcing Risk

Outsourcing risk is exposure that results from delegating business processes or services to third parties.

Learn more
Payment Services Directive (PSD2)

PSD2 is an EU regulation governing payment services, security, and open banking requirements.

Learn more
PCI DSS

PCI DSS is a global standard for protecting payment card data.

Learn more
Performance Monitoring

Performance monitoring tracks how well vendors meet service, operational, and contractual expectations.

Learn more
Phishing

Phishing is a social engineering attack that tricks users into revealing sensitive information or executing malicious actions.

Learn more
Policy & Procedure Review

Policy and procedure review evaluates documentation for accuracy, relevance, and regulatory alignment.

Learn more
Predictive Risk Modeling

Predictive risk modeling uses data, analytics, and patterns to forecast future risk levels.

Learn more
Privacy Risk

Privacy risk is exposure created by improper or non-compliant handling of personal data.

Learn more
Procurement Risk Management

Procurement risk management addresses risks associated with sourcing, acquiring, and contracting goods or services.

Learn more
Proxy Server

A proxy server acts as an intermediary for requests between users and external systems.

Learn more
Ransomware

Ransomware is malware that encrypts data and demands payment for restoration.

Learn more
Ransomware Action Plan

A ransomware action plan outlines the steps for responding to and recovering from a ransomware incident.

Learn more
Real-Time Risk Alerts

Real-time risk alerts notify stakeholders when new risk events or indicators occur.

Learn more
Real-Time Risk Posture

Real-time risk posture reflects a continuously updated view of an organization’s or vendor’s risk level.

Learn more
Regulatory Evidence Package

A regulatory evidence package compiles documentation required to demonstrate compliance during regulatory reviews.

Learn more
Reputational Risk

Reputational risk is the potential for damage to public trust due to negative events or associations.

Learn more
Residual Risk

Residual risk is the remaining risk after controls and mitigation measures have been applied.

Learn more
Risk Appetite

Risk appetite is the level of risk an organization is willing to accept to achieve objectives.

Learn more
Risk Assessment

A risk assessment identifies, analyzes, and evaluates risks associated with a vendor, system, or process.

Learn more
Risk Domain Mapping

Risk domain mapping links risks to categories such as cyber, privacy, financial, or operational risk.

Learn more
Risk Exposure

Risk exposure is the potential impact and likelihood of a risk affecting the organization.

Learn more
Risk Lifecycle

The risk lifecycle includes the stages of identifying, assessing, mitigating, monitoring, and retiring risks.

Learn more
Risk Owner

A risk owner is the individual responsible for managing and accepting a specific risk.

Learn more
Risk Posture Score

A risk posture score quantifies the overall level of risk associated with a vendor or system.

Learn more
Risk Reduction Over Time

Risk reduction over time tracks decreases in exposure due to remediation or improved controls.

Learn more
Risk Scoring Model

A risk scoring model quantifies risk using structured criteria and weighted metrics.

Learn more
Risk Tiering

Risk tiering categorizes vendors into levels based on inherent and residual risk.

Learn more
Risk-Based Vendor Segmentation

Risk-based vendor segmentation groups vendors by risk level rather than spend or category.

Learn more
Routing & Escalation Rules

Routing and escalation rules define how tasks, alerts, and approvals move through workflows.

Learn more
Sanctions Screening

Sanctions screening checks vendors against global sanctions lists to ensure compliance with legal restrictions.

Learn more
SAQ (Self-Assessment Questionnaire)

A SAQ is a vendor-completed questionnaire used to self-report controls and compliance posture.

Learn more
Sarbanes-Oxley Act (SOX)

SOX is a U.S. law requiring financial reporting integrity and internal control effectiveness.

Learn more
SASE (Secure Access Service Edge)

SASE combines network security and connectivity into a cloud-delivered architecture.

Learn more
Scalability Metrics

Scalability metrics measure how well systems or vendors handle growth in demand, data, or users.

Learn more
Security Controls Testing

Security controls testing validates whether controls prevent or detect threats effectively.

Learn more
Security Operations Center (SOC)

A SOC is a centralized function that monitors, detects, and responds to security threats.

Learn more
Security Questionnaire

A security questionnaire collects information about a vendor’s security controls and practices.

Learn more
Server Message Block (SMB)

SMB is a network protocol used for file sharing, printing, and communication between systems.

Learn more
SIG Questionnaire (Standardized Information Gathering)

The SIG questionnaire is a standardized vendor assessment used to evaluate risk and compliance.

Learn more
Single-Pane View

A single-pane view consolidates data and insights into one unified interface.

Learn more
SLA Enforcement

SLA enforcement ensures vendors meet contractual performance and service-level commitments.

Learn more
SLACIP Act

The SLACIP Act is an Australian law focused on critical infrastructure security and resilience.

Learn more
Slow Onboarding Risk

Slow onboarding risk is exposure created when vendor activation or due diligence delays operations.

Learn more
SOC 1 / SOC 2 / SOC 3

SOC 1, SOC 2, and SOC 3 are audit reports evaluating vendor controls for financial reporting, security, privacy, and operations.

Learn more
Social Engineering

Social engineering manipulates people into revealing information or performing risky actions.

Learn more
Spring4Shell

Spring4Shell is a critical vulnerability in the Spring Framework that enables remote code execution.

Learn more
Stakeholder Approval Workflow

A stakeholder approval workflow routes assessments, risks, or changes to required approvers.

Learn more
Standard Definitions

Standard definitions ensure consistent terminology across risk, compliance, and governance processes.

Learn more
Supply Chain Risk

Supply chain risk is exposure arising from vulnerabilities in interconnected vendors and service providers.

Learn more
Surface Web Monitoring

Surface web monitoring analyzes publicly accessible websites for risk or exposure.

Learn more
System-of-Record for Risk

A system-of-record for risk is the authoritative source storing all risk data, decisions, and evidence.

Learn more
Task Assignment

Task assignment allocates responsibilities for assessments, reviews, remediation, or approvals.

Learn more
Task Automation Engine

A task automation engine automates repetitive workflows across risk and compliance processes.

Learn more
Termination Risk

Termination risk is exposure created when ending a vendor relationship disrupts operations or compliance.

Learn more
The California Consumer Privacy Act (CCPA)

CCPA is California’s privacy law governing how personal information is collected, used, and shared.

Learn more
The General Data Protection Regulation (GDPR)

GDPR is the EU’s privacy law governing personal data rights and processing requirements.

Learn more
The Gramm–Leach–Bliley Act (GLBA)

GLBA is a U.S. law requiring financial institutions to protect customer financial information.

Learn more
Third-Party

A third-party is an external organization providing products or services to an enterprise.

Learn more
Third-Party Classification

Third-party classification groups vendors based on their role, service type, or risk level.

Learn more
Third-Party Due Diligence

Third-party due diligence evaluates vendor risks before and during the relationship.

Learn more
Third-Party Evaluation

Third-party evaluation assesses vendor performance, controls, and overall suitability.

Learn more
Third-Party Oversight

Third-party oversight ensures continuous monitoring and management of vendor risks.

Learn more
Third-Party Portfolio Health

Portfolio health reflects the overall risk, compliance, and performance status of all third-parties.

Learn more
Third-Party Registration

Third-party registration captures vendor details and initializes onboarding workflows.

Learn more
Third-Party Risk Management (TPRM)

TPRM is the program that identifies, assesses, and manages risks associated with third-party vendors.

Learn more
Third-Party Risk Scoring

Third-party risk scoring quantifies vendor risk using structured metrics and criteria.

Learn more
Threat Intelligence

Threat intelligence provides insights into current and emerging cyber threats that may affect systems or vendors.

Learn more
Tiered Due Diligence

Tiered due diligence applies different assessment levels based on vendor risk tier.

Learn more
Transaction Monitoring

Transaction monitoring tracks activities to detect fraud, anomalies, and suspicious behavior.

Learn more
TTP Hunting

TTP hunting searches for attacker tactics, techniques, and procedures in systems and environments.

Learn more
U.S. Executive Order 14028 (Cybersecurity)

Executive Order 14028 strengthens national cybersecurity requirements for federal systems and suppliers.

Learn more
UK-GDPR

UK-GDPR is the United Kingdom’s data protection law, aligned with the EU GDPR framework.

Learn more
Vendor

A vendor is an external organization providing goods or services to a company.

Learn more
Vendor Assurance

Vendor assurance validates that vendors meet required security and compliance standards.

Learn more
Vendor Classification

Vendor classification groups vendors based on function, service type, or operational role.

Learn more
Vendor Coverage Rate

Vendor coverage rate measures how many vendors have completed assessments, evidence submissions, or monitoring requirements.

Learn more
Vendor Evaluation Criteria

Vendor evaluation criteria are the standards used to assess a vendor’s capabilities, controls, and suitability.

Learn more
Vendor Governance

Vendor governance oversees how vendors are managed, monitored, and held accountable.

Learn more
Vendor Master File

A vendor master file is the authoritative record of all vendor information maintained by an organization.

Learn more
Vendor Offboarding

Vendor offboarding is the process of safely terminating a vendor relationship and removing access.

Learn more
Vendor Onboarding

Vendor onboarding is the process of initiating a new vendor relationship, including due diligence and approvals.

Learn more
Vendor Performance Risk

Vendor performance risk is the potential for a vendor to fail to meet service, quality, or operational expectations.

Learn more
Vendor Portfolio Segmentation

Vendor portfolio segmentation groups vendors based on shared characteristics or risk levels.

Learn more
Vendor Relationship Risk

Vendor relationship risk is exposure arising from dependency, misalignment, or instability in vendor relationships.

Learn more
Vendor Risk Assessment

A vendor risk assessment evaluates a vendor’s security, compliance, operational, and financial risks.

Learn more
Vendor Risk Management (VRM)

VRM is the structured practice of identifying and managing risks posed by third-party vendors.

Learn more
Vendor Risk Management Program

A VRM program is the formal framework governing how vendor risks are evaluated and managed.

Learn more
Vendor Risk Ratings

Vendor risk ratings quantify vendor risk into defined categories or scores.

Learn more
Vendor Tiering

Vendor tiering groups vendors into levels based on risk, criticality, or regulatory exposure.

Learn more
Watchlist Monitoring

Watchlist monitoring checks vendors against sanction, criminal, regulatory, or enforcement lists.

Learn more
Web Shell

A web shell is malicious code that allows attackers remote access to a compromised web server.

Learn more
Workflow Orchestration

Workflow orchestration automates and coordinates tasks across risk and compliance processes.

Learn more
Zero Trust

Zero Trust is a security model that assumes no implicit trust and verifies every access request.

Learn more
Easier third-party onboarding. Seamless compliance. Complete risk control.