Skip to main content

Third-Party Risk Landscape

NEW FOR 2025

Firms rely on third parties for many activities and functions, which can present risks. Over recent years FINRA has observed an increase in cyberattacks and outages at third-party vendors1 (also known as third-party providers2) firms use. Given the financial industry’s reliance on third-party vendors to support key systems and covered activities3, an attempted cyberattack or an outage at a third-party vendor could potentially impact a large number of firms.

Regulatory Obligations 

Firms have an obligation to establish and maintain a supervisory system, including establishing and maintaining written supervisory procedures for any activities or functions third-party vendors perform, that is reasonably designed to achieve compliance with applicable securities laws and regulations (e.g., Regulation S-P)4 and with applicable FINRA rules (e.g., FINRA Rules 3110 and 4370).

Observations and Effective Practices

Observations

Below are areas that have emerged in recent FINRA examinations that firms may consider when developing and enhancing their third-party vendor risk management programs:

  • establishing adequate third-party vendor risk management policies;
  • conducting initial or ongoing due diligence on third-party vendors that support systems related to key areas (e.g., information technology and cybersecurity; AML monitoring)
  • validating data protection controls in third-party vendor contracts;
  • involving third-party vendors that support key systems in the testing of their Incident Response Plan;
  • maintaining a list of all third-party services, or third-party provided hardware and software components, that the firm’s technology infrastructure uses;
  • having procedures that address the return or destruction of firm data at the termination of a third-party vendor contract; and
  • addressing third-party vendors’ use of vendors (i.e., fourth-party vendors) that may handle firm data.

FINRA’s Firm Outreach

  • FINRA’s Risk Monitoring program engages with firms on an ongoing basis to understand how firms use and supervise third-party vendors. 
  • In November 2023, FINRA issued a questionnaire to gather information from firms related to their engagement with third-party vendors, particularly those used for mission critical systems and functions. This information supplemented FINRA’s understanding of the potential impact and effect of a third-party vendor event for our firms and the securities markets. 
  • Additionally, FINRA used the information we gathered to quickly and proactively alert firms of cybersecurity and other vendor-related events that may impact their firm. 
  • Firms can contact their Risk Monitoring Analyst to report any changes to third-party vendors that support their key systems or any cybersecurity events at these vendors.

Effective Practices

Firms that use—or are contemplating using—third-party vendors may consider these effective practices when assessing and managing the risks associated with third-party vendors during the lifecycle of the relationship, from onboarding to ongoing monitoring, through offboarding, including, for example:

  • maintaining a list of all third-party vendor-provided services, systems and software components that the firm can leverage to assess the impact on the firm in the event of a cybersecurity incident or technology outage at a third-party vendor;
  • establishing supervisory controls for a third-party technology vendor’s business impact, including assessments and contingency plans;
  • evaluating the impact on the firm’s ability to meet its regulatory obligations if the third-party vendor fails to perform the outsourced activity or function;
  • asking potential third-party vendors if they incorporate Gen AI5 into their products or services, and, if so, evaluating contracts with these third-party vendors and requesting that they be amended—as necessary—to comply with your firm’s regulatory obligations (e.g., adding language that prohibits firm or customer sensitive information from being ingested into a third-party vendor’s open-source Gen AI tool);
  • reviewing, and as appropriate adjusting, third-party vendor tool default features and settings to meet firm business needs and applicable regulatory obligations (e.g., disabling a chat feature, reviewing whether communications are being captured for supervisory review);
  • assessing third-party vendors’ ability to protect sensitive firm and customer non-public information and data; and
  • ensuring that a third-party vendor’s access to systems, data and corporate infrastructure is revoked when the relationship ends.

Additional Resources


1 See Regulatory Notice 21-29 (FINRA Reminds Firms of their Supervisory Obligations Related to Outsourcing to Third-Party Vendors) for additional guidance concerning third-party vendors (e.g., common activities or functions firms outsource to third-party vendors; questions firms may consider when evaluating their systems, procedures and controls relating to third-party vendor management).

2 The FINRA Cybersecurity Advisory—Increasing Cybersecurity Risks at Third-Party Providers incorporates the National Institute of Standards and Technology’s (NIST) definition of third-party providers: "service providers, integrators, vendors, telecommunications, and infrastructure support that are external to the organization.” However, its guidance is still applicable to firms that are designing or strengthening their compliance programs with regard to third-party vendor risk management. 

3 As noted in Regulatory Notice 21-29 (FINRA Reminds Firms of their Supervisory Obligations Related to Outsourcing to Third-Party Vendors), “covered activities” refers to “activities or functions that, if performed directly by a member firm, would be required to be the subject of a supervisory system and WSPs pursuant to FINRA Rule 3110.”

4 The Regulation S-P amendments will require covered institutions, as part of their incident response programs, to establish, maintain and enforce written policies and procedures reasonably designed to require oversight, including through due diligence and monitoring, of service providers. These policies and procedures must be reasonably designed to ensure that service providers take appropriate measures to (i) protect against unauthorized access to or use of customer information; and (ii) provide notification to the covered institution as soon as possible, but no later than 72 hours after becoming aware that a breach in security has occurred resulting in unauthorized access to a customer information system maintained by the service provider.

5 See the Report’s Emerging Risk: Adversarial Use of Generative Artificial Intelligence “callout” box for more guidance concerning firms’ use of Gen AI technology.

6 See the Report’s Third-Party Risk Landscape topic for additional information on FINRA’s vendor questionnaire to firms, as well as guidance concerning firms’ use of third-party vendors.

7 As noted in Regulatory Notice 24-09 (FINRA Reminds Members of Regulatory Obligations When Using Generative Artificial Intelligence and Large Language Models), to the extent firms find ambiguity in the application of FINRA rules based on their specific use of Gen AI or other technology, they may seek interpretive guidance from FINRA by following FINRA’s process for interpretive requests. Firms also are encouraged to have ongoing discussions with their Risk Monitoring Analyst as AI-related issues or other changes in their business arise.