Quantify third‑party exposure with a consistent scoring model. Adjust weights to match your critical systems. See the rating instantly and share it with teams.
| Vendor | Base | Confidence | Final | Tier | Notes |
|---|---|---|---|---|---|
| Acme Cloud Services | 61.2 | 0.80 | 66.7 | Medium | Privileged access with integrations; remediation pending. |
| Northwind Payroll | 72.4 | 0.70 | 80.0 | High | Regulated data; limited evidence; fourth parties involved. |
| Contoso Design Studio | 24.8 | 0.90 | 26.3 | Low | No production access; minimal data exchange. |
Third‑party services often hold data, credentials, or operational influence that expands your attack surface. A structured rating converts qualitative findings into a comparable 0–100 score. Using a 1–5 rubric reduces reviewer bias and supports repeatable decisions. Organizations that standardize vendor assessments typically shorten onboarding cycles and improve remediation tracking because expectations are explicit. When scores are stored over time, trends highlight vendors whose risk is increasing due to scope creep or deteriorating controls.
This calculator uses nine criteria that map to common third‑party risk drivers: sensitivity of handled data, level of access, connectivity, control maturity, incident history, compliance impact, business criticality, subcontractor reliance, and financial stability. Each criterion is intentionally broad so you can score consistently with limited information. For example, “connectivity” captures whether integrations are transient, API‑based, or persistent network links. “Incident history” considers both frequency and transparency of disclosures.
Weights force prioritization. If you process regulated records, allocate more weight to data sensitivity and compliance impact. If vendors receive privileged access, raise access level and control maturity weights. The calculator validates that weights total 100 so the score remains interpretable. Normalizing the 1–5 scores to 0–100 keeps units consistent and makes each contribution easy to explain to stakeholders.
Risk tiers translate scores into governance actions. Low risk often fits standard clauses and annual reviews. Medium risk should trigger time‑bound remediation, evidence requests, and more frequent monitoring. High risk warrants executive approval, stronger contractual controls, and technical safeguards such as least‑privilege, segmentation, and logging requirements. Confidence also matters: limited evidence increases the final score slightly to reflect uncertainty and encourage follow‑up.
A rating is most useful when paired with workflow. Store the inputs, evidence links, and compensating controls alongside the final score. Reassess after changes in data types, integrations, or subcontractors. Use the CSV export to load a register, and the PDF export for procurement packets. Track remediation due dates, and compare quarter‑over‑quarter scores to verify that promised improvements reduce measurable risk. Pair scores with security questionnaires, penetration summaries, and SLA metrics to keep assessments objective.
It is a weighted 0–100 rating based on normalized 1–5 scores across the selected criteria. Higher values indicate greater exposure, weaker controls, or higher uncertainty, and should drive stronger governance and monitoring actions.
Start with your threat model and data classification. Increase weights for criteria that create the most impact if compromised, such as regulated data, privileged access, persistent connectivity, or critical operational dependency.
When evidence is limited, the calculator applies a small uplift to reflect uncertainty. This encourages follow‑up documentation, validation testing, or contractual commitments before granting broader access or expanding scope.
Yes, as long as you apply the same rubric and weight set. If service types differ significantly, maintain separate weight templates so comparisons remain fair and aligned to the exposure each vendor introduces.
At least annually for low risk, quarterly for medium risk, and monthly or after major changes for high risk. Always reassess after scope, integration, data type, or subcontractor changes.
High data sensitivity, privileged access, persistent integrations, low control maturity, and unclear incident history commonly drive scores upward. Business criticality and fourth‑party reliance also increase governance needs because failures can cascade across operations.
Important Note: All the Calculators listed in this site are for educational purpose only and we do not guarentee the accuracy of results. Please do consult with other sources as well.