Understand how third-party risk is evolving in hybrid IT environments and how frameworks like NIST SP 800-161 and CSA CCM can guide your strategy.
Modern organisations rely on a sprawling ecosystem of cloud providers, SaaS platforms, managed service providers and niche vendors. In hybrid IT environments, where on-premises infrastructure coexists with multiple clouds and SaaS applications, this ecosystem becomes more complex and less visible.
Recent high-profile incidents show that attackers increasingly target suppliers and service providers as a way into enterprise networks. DACTA’s case study How a Supply Chain Attack Brought UK Retail to a Standstill illustrates how a single compromised provider can cascade operational disruption across an entire sector.
For CISOs, third-party risk management (TPRM) is no longer an isolated compliance function. It is a core part of cyber risk management, particularly in hybrid environments where ownership boundaries are blurred.
Hybrid IT amplifies third-party risk in several ways:
Traditional questionnaire-only approaches struggle to keep pace with this reality. CISOs need a structured approach anchored in well-recognised frameworks.
Two frameworks have emerged as particularly relevant for managing third-party and supply chain risk in hybrid environments.
NIST SP 800-161 Rev. 1 – Cybersecurity Supply Chain Risk Management
NIST SP 800-161 provides detailed guidance on integrating supply chain risk management into organisational risk processes, complementing existing NIST frameworks such as SP 800-53 and SP 800-39. It emphasises:
For CISOs, it can serve as a playbook for integrating TPRM into existing risk and compliance structures.
Cloud Security Alliance (CSA) Cloud Controls Matrix and CAIQ
The CSA Cloud Controls Matrix (CCM) is a widely used framework for assessing cloud security controls, mapping them to industry standards and regulations. The associated Consensus Assessments Initiative Questionnaire (CAIQ) is a standardised set of questions that cloud customers can use to evaluate provider security practices.
The CSA STAR Registry builds on these artefacts, providing a public catalogue of cloud providers’ security and privacy controls and levels of assurance (self-assessment, third-party certification, continuous auditing).
For hybrid environments, these frameworks help CISOs:
Frameworks are useful, but they must translate into concrete actions. A practical roadmap might include:
1. Build a complete third-party inventory
Catalogue all vendors, cloud providers, MSPs and critical open-source components used across IT, OT and business units. Include:
This inventory is the foundation for risk-based prioritisation.
2. Classify vendors by criticality and data sensitivity
Not all vendors are equal. Define tiers, for example:
Apply more rigorous assessments and monitoring to higher-tier vendors.
3. Standardise assessments using recognised frameworks
For cloud and SaaS providers, leverage CSA CCM, CAIQ and STAR entries where available to reduce bespoke questionnaires.
For broader suppliers, align questionnaires with NIST SP 800-161, focusing on:
DACTA’s article Vendor Risk Management: Key Questions to Ask Before Partnering offers a practical set of questions and real-world examples that can be adapted for your assessments.
4. Integrate TPRM into governance, risk and compliance
Third-party risks should feed into the same risk register and reporting mechanisms as internal risks. That means:
DACTA’s Governance, Compliance & Regulatory services help organisations embed these processes into their existing governance structures.
5. Monitor continuously, not just at onboarding
Annual questionnaires are not enough in fast-moving environments. Consider:
Hybrid environments introduce specific nuances:
DACTA Global works with organisations across regulated and high-risk sectors to align third-party risk with broader cyber resilience goals. Relevant services include:
Combined with insights from resources like Vendor Risk Management: Key Questions to Ask Before Partnering and How a Supply Chain Attack Brought UK Retail to a Standstill, DACTA helps CISOs translate frameworks into practical, risk-driven programmes.
In hybrid IT environments, third-party risk is not a side issue. It is a primary attack surface. CISOs who treat supplier security as integral to their cyber strategy, and who leverage frameworks like NIST SP 800-161 and CSA CCM, will be better placed to explain and manage risk to boards and regulators.
By building a clear inventory, applying risk-based assessments, integrating with governance and monitoring continuously, your organisation can gain control over a complex vendor landscape.
DACTA Global stands ready to support this journey, combining practical experience, recognised frameworks and managed services to help you turn third-party risk from a blind spot into a managed strength.
If you're experiencing an active security incident and need immediate assistance, contact the DACTA Incident Response Team (IRT) at support@dactaglobal.com.