Third-Party Risk Management Guideline B-10 from the Canadian Government Office of the Superintendent of Financial Institutions (OSFI) addresses the operational and financial risks associated with vendor and supplier relationships.
Guideline B-10 sets expectations for federally regulated financial institutions (FRFIs) to manage risks associated with third-party arrangements.
The guideline also expands the definition of a third party to include more entities like independent professionals, brokers and utilities, and recommends including all types of third parties in risk assessments.
Driving these new requirements is the shift from materiality to criticality – where a third party performs a function that is integral to the FRFI’s provision of a significant operation, function or service, requiring a dual-pronged approach where risk and criticality inform the nature and extent of due diligence activities.
Governance and accountability structures are clear with comprehensive risk strategies and frameworks in place
Risks posed by third parties are identified and assessed
Risks posed by third parties are managed and mitigated within the FRFI’s Risk Appetite Framework
Third-party performance is monitored and assessed, and risks and incidents are proactively addressed
The FRFI’s third-party risk management program allows the FRFI to identify and manage a range of third-party relationships on an ongoing basis
Technology and cyber operations carried out by third parties are transparent, reliable and secure
The OSFI B-10 Third-Party Compliance Checklist
Learn how to meet third-party assessment and monitoring requirements in OSFI Guideline B-10.
Complying with OSFI Guideline B-10
Guideline B-10 presents six expected outcomes for FRFIs to achieve through managing third-party risk. These outcomes are meant to contribute to the FRFI’s operational and financial resilience and help safeguard its reputation.
Supporting the six expected outcomes are 11 principles that OSFI describes as best practices for third-party risk management. The summary table below maps Prevalent Third-Party Risk Management Platform capabilities to these 11 principles.
NOTE: This table should not be considered comprehensive, definitive guidance. Consult your auditor for a complete list of requirements.
OSFI Guideline B-10 Principles | How We Help |
---|---|
Outcome 1: Governance and accountability structures are clear with comprehensive risk strategies and frameworks in place. |
|
Principle 1: “The FRFI is ultimately accountable for managing the risks arising from all types of third-party arrangements.” Principle 2: “The FRFI should establish a third-party risk management framework (TPRMF) that sets out clear accountabilities, responsibilities, policies, and processes for identifying, managing, mitigating, monitoring, and reporting on risks relating to the use of third parties.” |
Prevalent partners with you to build a comprehensive third-party risk management (TPRM) program based on proven best practices and extensive real-world experience. Our experts collaborate with your team on defining and implementing TPRM processes and solutions; selecting risk assessment questionnaires and frameworks; and optimizing your program to address the entire third-party risk lifecycle – from sourcing and due diligence, to termination and offboarding. As part of this process, Prevalent can help you define:
|
Outcome 2: Risks posed by third parties are identified and assessed. |
|
Principle 3: “The FRFI should identify and assess the risks of a third-party arrangement before entering the arrangement and periodically thereafter. Risk assessments should be proportionate to the criticality of an arrangement. Specifically, the FRFI should conduct risk assessments to decide on third-party selection; (re)assess the risk and criticality of the arrangement; and plan for adequate risk mitigation and oversight.” |
Prevalent centralizes and automates the distribution, comparison, and management of requests for proposals (RFPs) and requests for information (RFIs). Our solutions also deliver business, reputational, financial, and data breach risk insights to inform and add context to vendor selection decisions. Prevalent moves each selected vendor into contracting and/or onboarding due diligence phases, automatically progressing the vendor through the third-party lifecycle. Prevalent features a library of more than 750 pre-built templates for ongoing third-party risk assessments. These are integrated with native cyber, operational, reputational, and financial risk monitoring capabilities, which continuously validate assessment findings and fill gaps between assessments. Built-in remediation recommendations ensure that third parties address risks in a timely and satisfactory manner. With this capability, Prevalent assesses third parties prior to entering into third-party arrangements, regularly throughout the relationship, and whenever there is a material change in the relationship triggered by continuous monitoring. |
Principle 4: “The FRFI should undertake due diligence prior to entering contracts or other forms of arrangement with a third party, and on an ongoing basis proportionate to the level of risk and criticality of the arrangement.” |
Prevalent offers a pre-contract due diligence assessment with clear scoring based on eight criteria to capture, track and quantify inherent risks for all third parties. Criteria includes:
From this inherent risk assessment, your team can automatically tier suppliers; set appropriate levels of further diligence; and determine the scope of ongoing assessments. Rule-based tiering logic enables vendor categorization using a range of data interaction, financial, regulatory and reputational considerations. Prevalent features a library of more than 750 pre-built templates for third-party risk assessments. Assessments can be conducted at the time of contract renewal or at any required frequency (e.g., quarterly or annually). Assessment questionnaires can be globally focused or regional to address unique legal or operational requirements. Prevalent delivers built-in remediation recommendations based on risk assessment results. These are backed by workflow and task management capabilities to ensure that third parties address risks in a timely and satisfactory manner. Integrated, native cyber, operational, reputational, and financial risk monitoring capabilities flag material changes between periodic assessments and can trigger notifications, follow-up assessments, or other actions. With this capability, Prevalent enables your organization to assess risks prior to entering into the arrangement, as part of the contract renewal process, and periodically on an ongoing basis proportionate to the level of risk and criticality or whenever there are material changes to the third-party arrangement. |
Principle 5: “The FRFI is responsible for identifying, monitoring and managing risk arising from subcontracting arrangements undertaken by its third parties.” |
Prevalent can identify fourth-party and Nth-party subcontracting relationships by conducting a questionnaire-based assessment or by passively scanning the third party’s public-facing infrastructure. The resulting relationship map depicts information paths and dependencies that could expose your environment to risk. Suppliers discovered through this process are continuously monitored to identify financial, ESG, cyber, business, and data breach risks, as well as for sanctions/PEP screening. This approach provides insights to address potential technology or geographic concentration risk. |
Outcome 3: Risks posed by third parties are managed and mitigated within the FRFI’s Risk Appetite Framework. |
|
Principle 6: “The FRFI should enter into written arrangements that set out the rights and responsibilities of each party.” |
Prevalent centralizes the distribution, discussion, retention, and review of vendor contracts. It also offers workflow capabilities to automate the contract lifecycle from onboarding to offboarding. Key capabilities include:
With this capability, you can ensure that clear responsibilities are articulated in the vendor contract, and SLAs tracked and managed accordingly. |
Principle 7: “Throughout the duration of the third-party arrangement, the FRFI and third party should establish and maintain appropriate measures to protect the confidentiality, integrity and availability of records and data.” |
Prevalent delivers a centralized, collaborative platform for conducting privacy assessments and mitigating both third-party and internal privacy risks. Key data security and privacy assessment capabilities include:
|
Principle 8: “The FRFI’s third-party arrangements should allow the FRFI timely access to accurate and comprehensive information to assist it in overseeing third-party performance and risks. The FRFI should also have the right to conduct or commission an independent audit of a third party.” |
With Prevalent, auditors can establish a program to efficiently achieve and demonstrate compliance. The solution automates third-party risk management compliance auditing by collecting vendor risk information, quantifying risks, recommending remediations, and generating reports for dozens of government regulations and industry frameworks. Prevalent automatically maps information gathered from control-based assessments to ISO 27001, NIST, GDPR, CoBiT 5, SSAE 18, SIG, SIG Lite, SOX, NYDFS, and other regulatory frameworks, enabling you to quickly visualize and address important compliance requirements. Further, Prevalent reveals risk trends, status and exceptions to common behavior for individual vendors or groups with embedded machine learning insights. This will enable you to quickly identify outliers across assessments, tasks, risks, etc. that could warrant further investigation. |
Principle 9: “The FRFI’s agreement with the third party should encompass the ability to deliver operations through a disruption, including the maintenance, testing, and activation of business continuity and disaster recovery plans. The FRFI should have contingency plans for its critical third-party arrangements.” |
Prevalent automates the assessment, continuous monitoring, analysis, and remediation of third-party business resilience and continuity – while automatically mapping results to NIST, ISO, and other control frameworks. To complement business resilience assessments and validate results, Prevalent:
This proactive approach enables your organization to minimize the impact of third-party disruptions and stay on top of compliance requirements. The Prevalent Platform includes a comprehensive business resilience assessment based on ISO 22301 standard practices that enables organizations to:
When a termination or exit is required for critical services, Prevalent leverages customizable surveys and workflows to report on system access, data destruction, access management, compliance with relevant laws, final payments, and more. The solution also suggests actions based on answers to offboarding assessments and routes tasks to reviewers as necessary. |
Outcome 4: Third-party performance is monitored and assessed, and risks and incidents are proactively addressed. |
|
Principle 10: “The FRFI should monitor its third-party arrangements to verify the third party’s ability to continue to meet its obligations and effectively manage risks.” |
Prevalent continuously tracks and analyzes external threats to third parties. The solution monitors the Internet and dark web for cyber threats and vulnerabilities, as well as public and private sources of reputational, sanctions and financial information. All monitoring data is correlated to assessment results and centralized in a unified risk register for each vendor, streamlining risk review, reporting and response initiatives. Monitoring sources include:
|
Principle 11: “Both the FRFI and its third-party should have documented processes in place to effectively identify, investigate, escalate, track, and remediate incidents to ensure ongoing operational and financial resilience and maintain risk levels within the FRFI’s risk appetite.” |
Prevalent enables your team to rapidly identify and mitigate the impact of third-party vendor incidents by centrally managing vendors, conducting event assessments, scoring identified risks, and accessing remediation guidance. |
Outcome 5: The FRFI’s third-party risk management program allows the FRFI to identify and manage a range of third-party relationships on an ongoing basis. |
|
Outcome 6: Technology and cyber operations carried out by third parties are transparent, reliable and secure. |
The Prevalent Platform includes a large library of standardized assessments (including those for NIST and ISO best practices frameworks) and customization capabilities to assess third parties with flexibility. For third parties that submit a SOC 2 report instead of a completed third-party risk assessment, Prevalent enables you to map control gaps identified within the SOC 2 report, create risk items against the third party within a central assessment platform, and track and report against deficiencies along with other risks. Regardless of the cybersecurity framework, Prevalent enables you to reduce assessment timelines and mitigate risks. |
Align Your TPRM Program with 14 Industry Standards
Download this guide to review industry standards with specific TPRM requirements, and discover best practices for simplifying compliance.
Learn about the third-party assessment requirements in Guideline B-10 from the Office of the Superintendent of...
NS&I was looking for a way to automate their third-party risk management process, making it less...
The FCA defines guidance for selecting secure outsourced IT vendors. Discover the key criteria for compliance...