Third-Party Risk Management

Your vendor's breach
is your headline

Every vendor with access to your systems is part of your attack surface. Most teams manage that exposure with spreadsheets and annual questionnaires. Alvor brings structured assessment, continuous monitoring, and a complete audit trail to every vendor relationship - before something goes wrong.

LOWMEDHIGHCRITCRITHIGHMEDLOW121133362541

Six stages. Every vendor.
No exceptions.

Every vendor relationship follows the same structured path from onboarding request through to a formal, documented decision. No informal approvals. No gaps in the record.

01

Vendor onboarding triggered

A new vendor request or renewal is submitted with business context, data access scope, and the estimated go-live date. Alvor creates the vendor record and starts the SLA clock immediately - no vendor sits in a queue without an owner.

Vendor recordBusiness contextAccess scope

Every vendor.
Every risk level.
One view.

A live portfolio dashboard that tells you exactly where your vendor risk is concentrated - without asking you to build it yourself in a pivot table.

  • Risk matrix across all vendor tiers and risk levels
  • SLA tracking with breach alerts before deadlines pass
  • Portfolio health score updated after every assessment
  • Findings dashboard linked to vendor and remediation owner

Total Vendors

84

Critical Tier

6

Open Findings

23

SLA Breached

3

Low

Med

High

Crit

CRIT

1
2
1

HIGH

1
3
3

MED

3
6
2

LOW

5
4
1

Approval status

Approved (61)
Conditional (15)
Under Review (8)

Eight domains.
One aggregate score.

Every assessment scores the vendor across eight security domains, weighted by their access type. The aggregate score drives the decision - with full transparency into which domain pulled it down.

  • Domains weighted by data access and system privileges
  • Score history shows improvement or regression over time
  • Findings linked directly to the domain that triggered them
  • Certification evidence stored and tracked for expiry
SA

Security Architecture

Network segmentation, encryption standards, and infrastructure hardening practices

AC

Access Control

Identity management, MFA enforcement, and privileged access governance policies

DP

Data Protection

Classification policies, at-rest and in-transit encryption, and retention controls

IR

Incident Response

Detection capabilities, response playbooks, and breach notification timelines

BC

Business Continuity

Recovery time objectives, tested disaster recovery plans, and geographic redundancy

SP

Sub-Processor Risk

Visibility into subcontractors, nested vendor policies, and supply chain controls

CM

Compliance

Active certifications (SOC 2, ISO 27001, PCI), audit histories, and regulatory standing

PS

Physical Security

Facility access controls, data centre certifications, and physical access logging

Further reading

Thinking on vendor and third-party risk.

8 min read

Vendor Risk Management That Actually Works

Most vendor risk programs are a spreadsheet of questionnaires that nobody reads after they're collected. Here is how to build a program that genuinely reduces third-party risk.

Third-Party Risk Management

Stop trusting vendors on faith. Start assessing them on evidence.

Alvor brings structure, consistency, and a complete audit trail to every third-party relationship - from the first request to the annual renewal. Your vendors, your risk, your record.