The Vulnerabilities You Don’t See: Third-Party Risk in Your Supply Chain
Author: Marie Strawser, UMSA Managing Director
November 24, 2025
As executives overseeing critical infrastructure, you’ve invested millions in perimeter security, endpoint protection, and employee training. Your Security Operations Center operates around the clock. Your incident response plans are tested quarterly. Yet the greatest threat to your organization may not be lurking in your own network—it’s hiding in the systems of vendors you’ve never met, several layers deep in your supply chain.
The Invisible Attack Surface
Most executives can name their Tier 1 vendors—the major technology providers, equipment manufacturers, and service contractors whose logos appear regularly in procurement reports. However, critical infrastructure organizations often collaborate with hundreds or thousands of third parties, creating a complex ecosystem of interconnected risks that few leadership teams fully comprehend.
Consider this: when the credentials of a small HVAC contractor were compromised in 2013, the result was a breach affecting 40 million credit cards. If an HVAC vendor can establish a foothold within a company, consider the exposure created by the specialized industrial control system manufacturers, software providers, maintenance contractors, and logistics companies that keep your critical infrastructure operational.
The problem extends far beyond your direct vendors. Your Tier 1 supplier relies on Tier 2 subcontractors, who, in turn, depend on Tier 3 component manufacturers, which source raw materials from Tier 4 providers. Each connection represents a potential vulnerability. Each handoff creates an opportunity for compromise. And in most organizations, visibility typically ends at Tier 1—if it even reaches that far.
Why Traditional Vendor Management Falls Short
Many organizations approach third-party risk with a compliance mindset, distributing security questionnaires, checking boxes on audit requirements, and filing certificates of insurance. This approach creates an illusion of control while missing the dynamic reality of supply chain risk.
Security questionnaires are typically completed once during vendor onboarding, then forgotten. A vendor’s security posture can deteriorate dramatically between annual reviews. Mergers, acquisitions, leadership changes, budget cuts, or geographic expansion can all fundamentally alter a vendor’s risk profile overnight. Meanwhile, your organization continues to trust them with access to critical systems based on answers they provided eighteen months ago.
Compliance certificates tell you what standards a vendor claims to meet, not whether their actual practices protect your infrastructure. A vendor can possess ISO 27001 certification while simultaneously running unpatched systems, using default passwords, or outsourcing work to uncertified subcontractors in jurisdictions with minimal security requirements.
The fundamental problem is that traditional vendor management treats third-party risk as a static, point-in-time assessment rather than a continuous, evolving challenge that requires ongoing vigilance.
The Cascading Impact on Critical Infrastructure
When third-party vulnerabilities are exploited in critical infrastructure contexts, the consequences extend far beyond data breaches or financial losses. They can pose a threat to public safety, national security, and economic stability.
The 2021 Colonial Pipeline ransomware attack, which disrupted fuel supplies across the Eastern United States, began with a compromised VPN password. This single credential opened the door to a company carrying 45% of the East Coast’s fuel. The ripple effects included panic buying, price spikes, emergency declarations, and questions about the resilience of America’s energy infrastructure.
Similarly, when software provider SolarWinds was compromised, the attackers didn’t just breach one company—they gained access to approximately 18,000 organizations that had installed the tainted software update, including multiple federal agencies and critical infrastructure operators. The sophistication of the attack and the vendor’s trusted position created an almost perfect infiltration vector.
These incidents highlight a troubling reality: adversaries have recognized that attacking critical infrastructure directly is difficult, but compromising the vendors who serve that infrastructure offers a more accessible pathway. Why breach a hardened water utility when you can compromise the industrial control system vendor whose software runs the treatment plant?
The Hidden Risks in Your Supply Chain
Beyond the headline-grabbing attacks, several categories of third-party risk receive insufficient executive attention:
Fourth-party and nth-party risk…
represents the exposure created by your vendors’ vendors. When you grant a contractor access to your systems, you’re implicitly extending trust to everyone they work with—whether you know about those relationships or not. A single weak link four or five tiers down can compromise the entire chain.
Geographic and geopolitical risk…
emerges when supply chains span multiple jurisdictions with varying security standards, legal requirements, and political pressures. Components manufactured in adversarial nations may contain hidden vulnerabilities. Data processed in certain jurisdictions may be subject to foreign intelligence laws. Maintenance performed remotely from overseas locations creates potential interception points.
Concentration risk…
occurs when multiple vendors rely on the same underlying infrastructure, creating single points of failure that aren’t obvious from your direct relationships. If five of your critical vendors all use the same cloud provider, the same shipping company, or the same software platform, you have far more concentration risk than your vendor diversity suggests.
Legacy relationship risk…
often stems from vendors who’ve worked with your organization for decades. Long-standing relationships can create complacency, with reduced scrutiny and grandfathered-in access rights that would never be granted to new vendors. These trusted partners may be running on outdated technology and security practices, coasting on institutional trust while presenting significant vulnerabilities.
Building Visibility Into the Invisible
Addressing third-party risk begins with visibility, but achieving meaningful visibility into supply chain security requires moving beyond questionnaires and certifications to develop a more dynamic and comprehensive understanding of your ecosystem.
Begin by mapping your extended supply chain, focusing on criticality and access. Which vendors have access to your most sensitive systems? Who has the keys to your operational technology environment? Which suppliers could halt your operations if they disappeared tomorrow? This criticality mapping should drive risk prioritization—not all vendors deserve equal scrutiny, but your most critical suppliers warrant deep, ongoing attention.
Implement continuous monitoring rather than periodic assessments. Several platforms now offer real-time visibility into vendor security postures, monitoring for indicators like data breaches, certificate expirations, vulnerable software versions, and security configuration changes. While these tools aren’t perfect, they provide a more current view than annual questionnaires.
Require transparency into subcontracting relationships for critical vendors. Your contracts should include provisions for visibility into fourth-party relationships that touch your systems or data. If your vendor can’t or won’t disclose their critical subcontractors, that opacity itself represents a risk factor that should influence your decision-making.
Conduct supply chain threat modeling exercises that go beyond your organization’s perimeter. Collaborate with your security team to identify potential attack paths within your vendor ecosystem. Where would a sophisticated adversary focus their efforts if they wanted to reach your critical systems through your supply chain? These exercises often reveal non-obvious vulnerabilities that questionnaires would never surface.
Contractual Protections That Actually Protect
Contracts represent your primary tool for managing third-party risk, yet many organizations rely on boilerplate language that provides minimal protection when incidents occur. Effective supply chain security requires contracts that are specific, enforceable, and aligned with your actual risk exposure.
Security requirements should be explicit and technical, not generic. Rather than requiring vendors to maintain “reasonable security practices,” specify the controls that matter for your context: multi-factor authentication for all access to your systems, encryption standards for data in transit and at rest, patch management timelines, and incident response obligations. Vague requirements invite interpretation and make enforcement nearly impossible.
Audit rights should extend beyond your direct vendors to their critical subcontractors. Your ability to verify security practices should follow your data and access wherever they go. Without this visibility, you’re accepting assurances without the ability to verify, a position no executive should find comfortable.
Incident notification requirements need teeth. Specify exactly when and how vendors must notify you of security incidents, breaches, or compromises that could affect your organization. Include financial penalties for delayed notification—without consequences, notification requirements become suggestions that vendors may ignore when facing reputational concerns.
Right-to-terminate clauses based on security posture give you an exit when vendor risk becomes unacceptable. If a vendor suffers a significant breach, undergoes a problematic acquisition, or demonstrates persistent security failures, you should have contractual mechanisms in place to terminate the relationship without incurring excessive penalties.
Building a Risk-Aware Procurement Culture
Supply chain security cannot be delegated entirely to security or risk management teams. It requires cultural change in how your organization approaches procurement and vendor relationships.
Procurement teams need to understand that the lowest bid often carries hidden costs in the form of security risk. A vendor that underbids competitors may be cutting corners on security investments. Your procurement processes should explicitly factor security posture into vendor selection, treating it as seriously as cost, capability, and reliability.
Business unit leaders who sponsor vendor relationships must hold vendors accountable for the risks they introduce. When a department head pushes to onboard a new vendor quickly, they should understand the security implications and accept responsibility for managing the ongoing risk. This accountability prevents security from becoming a bottleneck while ensuring risks are consciously accepted at appropriate levels.
Executive leadership must visibly prioritize supply chain security through resource allocation, policy emphasis, and personal engagement. When the C-suite treats third-party risk as a critical business issue rather than a technical concern, the entire organization responds accordingly.
The Path Forward
Third-party risk in critical infrastructure supply chains is not a problem that can be solved—it’s a condition that must be managed. As long as your organization relies on external vendors, suppliers, and partners, you will face supply chain vulnerabilities. The question is whether you manage these risks deliberately or discover them when adversaries exploit them.
The most effective approach combines technical controls, contractual protections, continuous monitoring, and cultural change. No single initiative will eliminate supply chain risk, but a comprehensive program can significantly reduce your exposure and improve your ability to respond when incidents occur.
For executives, the key is recognizing that third-party risk is not a security problem—it’s a business risk that happens to involve security. It deserves the same strategic attention, resource allocation, and board-level oversight as any other significant business risk. The vendors you can’t see are often the vulnerabilities that matter most.
In an era where critical infrastructure faces persistent threats from sophisticated adversaries, your organization’s security is only as strong as the weakest link in your supply chain. The question every executive should be asking is: Do you know where that weak link is, or are you waiting to find out the hard way?
As we observe Critical Infrastructure Security and Resilience Month, now is the time to move beyond checkbox compliance and build genuine visibility into the third-party risks that threaten our most vital systems. The adversaries already understand your supply chain—make sure you do too.
