🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement Risk Assessment Procedures When Onboarding Third-Party Vendors to Comply with Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-5-3 (Checklist)

Practical, step-by-step guidance and a checklist for implementing vendor risk assessment procedures to meet ECC – 2 : 2024 Control 1-5-3 for the Compliance Framework.

March 25, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Onboarding third-party vendors introduces operational benefits and security risks; ECC – 2 : 2024 Control 1-5-3 requires organizations to implement formal risk assessment procedures during vendor onboarding to satisfy the Compliance Framework — this post shows practical steps, technical controls, and a checklist tailored for small businesses to meet that requirement.

What Control 1-5-3 Requires and the Key Objectives

Control 1-5-3 mandates that organizations perform documented risk assessments for third parties before granting access to systems, data, or sensitive facilities. The key objectives are to: (1) classify vendor risk by data sensitivity and access level, (2) ensure minimum security requirements are verified, (3) contractually bind vendors to security and notification obligations, and (4) maintain evidence for audit and continuous monitoring. For the Compliance Framework practice, “documented” means a repeatable, evidence-backed process that produces a vendor risk score and decision record stored in your vendor risk register.

Step-by-step Implementation Checklist (Practical)

Use this checklist as the backbone of your onboarding process: 1) Vendor intake & inventory — record business purpose, data types, and systems accessed; 2) Data classification mapping — note where regulated or sensitive data (PII, payment data) will be stored/processed; 3) Initial risk screening questionnaire — a short, mandatory pre-contract questionnaire; 4) Full assessment for medium/high risk — technical review, documentation (SOC 2, ISO 27001), vulnerability scan reports; 5) Risk scoring and approval — numeric score with tiered controls; 6) Contractual controls and SOW — SLAs, breach notification timelines, audit rights; 7) Technical onboarding controls — least privilege, segmentation, MFA, monitored credentials; 8) Ongoing monitoring and periodic reassessment; 9) Offboarding checklist — revoke access, return or destroy data, attestations. Implement these steps in your Compliance Framework as formal policies and map each to required evidence artifacts.

Technical Implementation Notes — Practical Details

For the initial and full assessments include specific technical checks: require TLS 1.2+ (preferably 1.3) for data-in-transit, AES-256 or equivalent for data-at-rest, enforce MFA for administrative accounts (SAML/OAuth/OpenID Connect where possible), and require vendor endpoints to run reputable EDR. Ask for recent vulnerability scan reports (authenticated scans where possible) and set acceptance thresholds — e.g., no internet-facing hosts with CVSS >= 7 unremediated for more than 30 days. For cloud vendors request architecture diagrams, tenant separation details, and evidence of encryption key management (KMS) and backup procedures. If vendor integration uses APIs, require scoped API keys, rate limiting, and short-lived tokens; for SSH access mandate key rotation every 90 days and log all sessions to a central syslog/SIEM. Document these technical minimums in the Compliance Framework’s vendor onboarding policy so assessors can verify configuration via screenshots, exported logs, or attestation letters.

Small-business example: a local e-commerce retailer engages a payment gateway, a hosted CMS, and an outsourced IT shop. Use the intake form to classify the payment gateway as high risk because it handles cardholder data and requires network access. For that vendor, require a current PCI Attestation of Compliance or validated P2PE implementation, impose network segmentation so the CMS and internal helpdesk can't reach the payment infrastructure, restrict helpdesk VPN access to jump hosts with session recording, and include a 48-hour incident notification clause. For the hosted CMS (medium risk), mandate daily backups, MFA for admin accounts, periodic vulnerability scans, and a 30-day patch window for critical fixes. The outsourced IT support gets limited, time-bound privileged access via temporary vaulted credentials and must provide proof of background checks for staff with admin access.

Risk Scoring, Decision Criteria, and Approval Workflow

Adopt a simple numeric risk model tuned for the Compliance Framework: score impact and likelihood on 1–5 scales and multiply for a 1–25 score. Define thresholds (e.g., 1–6 = low, 7–14 = medium, 15–25 = high). Example criteria: handling PII or payment data adds +2 impact, admin network access adds +2 likelihood; unpatched internet-facing services add +3 likelihood. Require formal approvals in your GRC or ticketing system: low-risk vendors get programmatic approval by the procurement/security generalist; medium-risk require CISO or delegate sign-off; high-risk require legal, security, and business unit executive approval and may require onsite or technical audits. Record approval artifacts (email approvals, signed risk acceptance forms) into the Compliance Framework evidence repository.

Consequences of not implementing Control 1-5-3 are tangible: without risk assessments you may unknowingly share sensitive systems or credentials, increasing exposure to supply-chain attacks, data breaches, regulatory fines, and business disruption. For small businesses, a single compromised vendor can lead to customer data loss, payment card fraud, or ransomware encryption of critical systems — frequently resulting in lost revenue and reputational harm that far exceed the cost of a modest vendor assessment program. Noncompliance also exposes you to audit failures and potential contractual penalties with customers demanding ECC compliance.

Monitoring, Reassessment, and Evidence for Audits

Implement continuous monitoring: subscribe to vendor security advisories, require quarterly attestations for critical vendors, schedule automated vulnerability scans and integrate vendor security alerts into your SIEM or ticketing system. Track KPIs such as time-to-onboard, time-to-remediate critical findings (target <= 30 days), and percentage of vendors with current attestations. Maintain evidence artifacts: intake form, completed questionnaire, risk scorecard, approvals, contracts with security clauses, penetration test or SOC reports, vulnerability scan exports, and access revocation logs. Use simple tools if you’re a small business — a shared spreadsheet or low-cost GRC/PSA tool — but ensure file names, timestamps, and a consistent retention schedule align with the Compliance Framework’s evidence requirements.

In summary, implementing ECC – 2 : 2024 Control 1-5-3 within the Compliance Framework means formalizing vendor intake, performing tiered risk assessments, enforcing technical minimums, embedding contractual controls, and maintaining auditable evidence. For small businesses this can be achieved incrementally: start with a concise intake questionnaire and inventory, add technical checks for medium/high risk vendors, and automate tracking as budget allows. Doing so reduces exposure, simplifies audits, and provides a demonstrable, repeatable process for safe third-party relationships.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes