Skip to content

Third-Party Risk — SOC Integration SOP

Document ID: OPS-SOP-014 Version: 1.0 Classification: Internal Last Updated: 2026-02-15

Third parties and supply chain partners extend your attack surface. This SOP defines how the SOC monitors, responds to, and manages risk from vendors, contractors, APIs, and outsourced services.


Scope

In Scope Out of Scope
Vendor VPN/remote access monitoring Vendor financial risk assessment
Third-party API security monitoring Contract negotiation
Supply chain attack detection Procurement process
Vendor incident notification & response Vendor selection
MSSP / outsourced SOC coordination Legal liability determination
SaaS/Cloud provider security monitoring Insurance claims

Third-Party Risk Categories

graph TD
    TP[Third-Party Risk] --> ACC[Access Risk]
    TP --> DATA[Data Risk]
    TP --> SUPPLY[Supply Chain Risk]
    TP --> SVC[Service Risk]
    TP --> COMP[Compliance Risk]

    ACC --> ACC1[VPN access]
    ACC --> ACC2[API credentials]
    ACC --> ACC3[Privileged accounts]

    DATA --> DATA1[Data sharing]
    DATA --> DATA2[Data processing]
    DATA --> DATA3[Data residency]

    SUPPLY --> SUPPLY1[Software updates]
    SUPPLY --> SUPPLY2[Open source dependencies]
    SUPPLY --> SUPPLY3[Hardware supply chain]

    SVC --> SVC1[Managed services]
    SVC --> SVC2[Cloud providers]

    COMP --> COMP1[PDPA compliance]
    COMP --> COMP2[Certification status]

    style TP fill:#3b82f6,color:#fff

Vendor Risk Tiering

Tier Criteria SOC Monitoring Level Review Frequency Access Type
Tier 1 🔴 Critical Direct access to production, handles PII, provides security services Full — real-time + dedicated alerts Monthly VPN + privileged accounts
Tier 2 🟠 High Access to staging/dev, handles business data, SaaS with sensitive data Enhanced — daily log review + alerts Quarterly Limited VPN / API keys
Tier 3 🟡 Medium Limited access, no sensitive data, non-critical services Standard — weekly review Semi-annually Portal / restricted API
Tier 4 🟢 Low No direct access, public-facing only Basic — event-driven Annually None / public API only

SOC Monitoring Requirements by Tier

Tier 1 — Critical Vendors

# Monitoring Requirement Data Source Alert Rule
1 Login/logout from vendor accounts IAM / AD Login outside approved hours, from new IP/country
2 Privileged commands executed EDR / cmdline logs Admin command from vendor account
3 Data access patterns DLP / file access logs Bulk download, access outside scope
4 Network traffic anomalies Firewall / NDR Large outbound transfer, unusual ports
5 API call volume & patterns API gateway logs Spike in API calls, new endpoints accessed
6 File modifications FIM Changes to critical files during vendor session
7 Lateral movement attempts EDR / SIEM Access to systems outside approved scope

Tier 2 — High Risk Vendors

# Monitoring Requirement Data Source
1 Login/logout tracking IAM / AD
2 Data access patterns DLP
3 API usage monitoring API gateway
4 Session duration tracking VPN / firewall

Tier 3–4 — Medium/Low Risk

# Monitoring Requirement Data Source
1 Authentication events IAM
2 API rate limiting alerts API gateway

Vendor Access Controls

Pre-Access Checklist

  • Vendor registered in vendor inventory
  • Tier classification assigned
  • Access request approved by system owner
  • MFA enforced for all vendor accounts
  • Time-limited access window configured
  • IP allowlist configured (where applicable)
  • Monitoring rules deployed per tier
  • Break-glass procedure confirmed

Access Monitoring Dashboard

Metric Current Alert Threshold
Active vendor sessions _____ > 10 concurrent
Vendor accounts with recent password change _____ < 90 days required
Vendor accounts without MFA _____ Must be 0
Dormant vendor accounts (no login 90 days) _____ Auto-disable
Vendor sessions outside approved hours _____ Auto-alert

Third-Party Incident Response

When a Vendor Is Compromised

flowchart TD
    A[🔔 Vendor Breach Notification] --> B{Our data affected?}
    B -->|Yes| C[P1: Activate IR]
    B -->|No| D[P3: Monitor & assess]
    B -->|Unknown| E[P2: Investigate urgently]

    C --> F[Disable all vendor access]
    C --> G[Scope data exposure]
    C --> H[Notify DPO / Legal]

    E --> I[Request vendor IOCs]
    E --> J[Retroactive hunt in logs]
    I --> K{Match found?}
    J --> K
    K -->|Yes| C
    K -->|No| L[Continue monitoring 30 days]

    D --> M[Review vendor remediation plan]
    M --> N[Update vendor risk score]

    style A fill:#3b82f6,color:#fff
    style C fill:#dc2626,color:#fff
    style L fill:#22c55e,color:#fff

Response Steps

Step Action Owner SLA
1 Receive vendor breach notification SOC Tier 2
2 Assess impact: Is our data/access affected? SOC Lead 1 hour
3 If affected: Disable all vendor access immediately SOC Engineering 15 min
4 Request vendor IOCs (IPs, domains, hashes, TTPs) SOC Lead 2 hours
5 Hunt for vendor IOCs in our logs (retroactive 90 days) SOC Tier 2/3 4 hours
6 If match found: Escalate to P1, full IR activation IR Manager Immediate
7 Notify DPO/Legal if PII potentially exposed SOC Manager 4 hours
8 PDPA notification if Thai citizen data affected DPO < 72 hours
9 Monitor vendor remediation progress Vendor Manager Weekly
10 Vendor must provide root cause + remediation report Vendor 30 days
11 Update vendor risk tier based on incident SOC Manager Post-incident

When SOC Detects Suspicious Vendor Activity

Step Action Owner
1 Alert triggered by vendor monitoring rule SOC Tier 1
2 Verify: Is this authorized activity? SOC Tier 2
3 If unauthorized: Suspend vendor access SOC Engineering
4 Contact vendor's security team SOC Lead
5 Conduct forensic investigation if needed SOC Tier 3
6 Document findings and update vendor risk score SOC Lead

Supply Chain Attack Detection

Red Flags to Watch For

Signal Detection Method Rule Example
Software update from unexpected source Hash verification Update hash ≠ vendor's published hash
Unexpected code in dependency SCA tools (Snyk, etc.) New dependency with low reputation
Vendor tool making unusual network calls NDR / firewall Vendor agent connecting to unknown IPs
Certificate change on vendor portal Certificate monitoring Cert issuer changed unexpectedly
Sudden change in vendor API behavior API monitoring New endpoints, changed data formats
Vendor domain DNS changes DNS monitoring Nameserver change, new CNAME records

SolarWinds-Style Defense Checklist

  • Validate update hashes before deployment
  • Monitor vendor software network behavior post-update
  • Segment vendor tools on separate network segment
  • Run vendor binaries in monitored sandbox first
  • Subscribe to vendor security advisories
  • Maintain vendor software bill of materials (SBOM)

Vendor Inventory Template

Vendor Name Tier Service Provided Data Access Access Method Monitoring Level Contract Expiry Last Review Risk Score
______ 1/2/3/4 ______ PII/Business/None VPN/API/Portal Full/Enhanced/Standard/Basic _-_- _-_- __/10
______ 1/2/3/4 ______ PII/Business/None VPN/API/Portal Full/Enhanced/Standard/Basic _-_- _-_- __/10

MSSP / Outsourced SOC Coordination

If parts of SOC operations are outsourced, these additional controls apply.

Requirement Details
Shared playbooks MSSP must follow same playbooks as internal team
Escalation path MSSP → Internal SOC Lead → IR Manager (documented)
Data handling MSSP cannot export data without approval
SLA monitoring Track MSSP MTTD, MTTR, SLA compliance separately
Audit rights Quarterly review of MSSP operations and access
Termination plan Documented plan for transitioning away from MSSP

Metrics

Metric Target Measurement
Vendor access reviews completed on time 100% Per tier schedule
Vendor accounts with MFA 100% Monthly check
Dormant vendor accounts disabled 100% (> 90 days) Automated check
Vendor incidents detected internally Track Before vendor notification
Mean time to disable compromised vendor < 15 min From detection to disable
Vendor IOC hunt completion < 4 hours From IOC receipt to scan complete