Control 2.7: Vendor and Third-Party Risk Management
Overview
Control ID: 2.7 Control Name: Vendor and Third-Party Risk Management Regulatory Reference: GLBA 501(b), SOX 404, FINRA 4511, OCC 2011-12, Fed SR 11-7, Interagency Third-Party Guidance (2023) Setup Time: 1-2 hours
Purpose
Establish a comprehensive framework for identifying, assessing, and managing risks associated with third-party vendors and connectors used by AI agents in the Power Platform environment. Vendor risk management is critical for financial services organizations because AI agents frequently connect to external services, APIs, and data sources that may introduce security vulnerabilities, compliance gaps, or operational dependencies. This control ensures that all third-party relationships are properly vetted, documented, and monitored throughout their lifecycle.
Description
Vendor and third-party risk management for AI agents extends traditional vendor management to address the unique risks introduced by Power Platform connectors, custom APIs, and external AI services. In financial services, third-party relationships are subject to rigorous regulatory scrutiny, and AI agents that connect to external services must be evaluated for data security, operational resilience, and regulatory compliance.
Key Capabilities
| Capability | Description | FSI Relevance |
|---|---|---|
| Connector Inventory | Complete catalog of all third-party connectors in use | Required for regulatory exams and audits |
| Vendor Risk Assessment | Systematic evaluation of vendor security and compliance | Meets OCC 2011-12 and Interagency Guidance requirements |
| Contract Management | Security clauses and SLAs in vendor agreements | Ensures contractual protections for data and operations |
| Ongoing Monitoring | Continuous oversight of vendor performance and risk | Detects emerging risks and service degradation |
| Exit Planning | Documented procedures for vendor termination | Ensures business continuity and data protection |
Connector Categories and Risk Levels
| Category | Examples | Risk Level | Assessment Frequency |
|---|---|---|---|
| Microsoft First-Party | Dataverse, SharePoint, Teams | Low | Annual |
| Certified Third-Party | Salesforce, SAP, ServiceNow | Medium | Semi-annual |
| Independent Publisher | Community-created connectors | High | Quarterly |
| Custom Connectors | Organization-built APIs | Medium-High | Quarterly |
| External AI Services | OpenAI, third-party LLMs | High | Quarterly |
Prerequisites
Primary Owner Admin Role: AI Governance Lead Supporting Roles: Compliance Officer
Licenses Required
| License | Purpose | Required For |
|---|---|---|
| Microsoft 365 E3/E5 | Core security and compliance | All environments |
| Power Platform Premium | Managed Environments, DLP policies | Connector governance |
| Copilot Studio | Agent creation and management | Agent governance |
| Microsoft Purview | Data governance and classification | Sensitive data controls |
| Power Platform Admin | Admin center access | Configuration |
Permissions Required
| Role | Purpose | Assignment Method |
|---|---|---|
| Power Platform Admin | Full admin access, connector policies | Entra ID role assignment |
| Environment Admin | Environment-level connector review | PPAC assignment |
| Compliance Administrator | Audit and compliance review | Entra ID role assignment |
| Security Reader | Security assessment access | Entra ID role assignment |
| Global Reader | Read-only access across tenant | Entra ID role assignment |
Dependencies
| Dependency | Description | Verification |
|---|---|---|
| DLP Policies | Data Loss Prevention policies configured | Check PPAC → Data policies |
| Managed Environments | Environments marked as managed | Check PPAC → Environments |
| Vendor Management Policy | Organizational vendor policy exists | Review IT governance docs |
| Contract Management System | System for tracking vendor contracts | Verify access to contracts |
| Risk Assessment Framework | Standardized risk assessment criteria | Review risk management docs |
Pre-Setup Checklist
- [ ] Inventory of current third-party connectors compiled
- [ ] Vendor management policy reviewed and updated for AI/agent use cases
- [ ] Risk assessment criteria defined for connector evaluation
- [ ] Contract templates updated with AI-specific security clauses
- [ ] Stakeholder roles assigned (Procurement, Legal, Security, Compliance)
- [ ] Monitoring and alerting requirements documented
- [ ] Incident response procedures for third-party issues defined
Governance Levels
Baseline (Level 1)
| Setting | Configuration |
|---|---|
| Connector Inventory | Maintained quarterly |
| Risk Assessment | Basic checklist completed |
| Contract Review | Security clauses present |
| Monitoring | Ad-hoc review |
Minimum requirements:
- Maintain inventory of all third-party connectors and integrations
- Complete basic vendor risk questionnaire for each vendor
- Document vendor relationships and contacts
Recommended (Level 2-3)
| Setting | Configuration |
|---|---|
| Connector Inventory | Maintained monthly |
| Risk Assessment | Formal assessment process with scoring |
| Contract Review | Standardized security addendum |
| Monitoring | Quarterly performance reviews |
| SLA Tracking | Documented with alerts |
FSI recommendations:
- Formal vendor assessment process with documented criteria
- Annual security questionnaires for all critical vendors
- SLAs documented and tracked
- Vendor contacts verified and updated
Regulated/High-Risk (Level 4)
| Setting | Configuration |
|---|---|
| Connector Inventory | Real-time tracking |
| Risk Assessment | Comprehensive vetting with board reporting |
| Contract Review | Legal review with regulatory-specific clauses |
| Monitoring | Continuous with automated alerts |
| Audit Rights | Contractually guaranteed |
| Exit Plans | Documented and tested |
FSI requirements:
- Comprehensive vendor vetting with contractual security requirements
- Continuous monitoring with automated alerting
- Audit access logs reviewed weekly
- Board-level reporting on critical vendor risks
- Annual on-site assessments for Tier 1 vendors
Setup & Configuration
Setup & Configuration Steps
Step 1: Inventory Third-Party Connectors
- Sign in to the Power Platform Admin Center (https://admin.powerplatform.microsoft.com)
- Navigate to Analytics > Power Automate or Power Apps
- Review connector usage reports across all environments
- Export the list of connectors in use
- Categorize connectors by:
- Publisher type (Microsoft, certified, independent, custom)
- Data sensitivity (what data flows through the connector)
- Business criticality (impact if connector fails)
- Environment placement (Tier 1, 2, or 3)
Document for each connector:
| Field | Description |
|---|---|
| Connector Name | Official connector name |
| Publisher | Microsoft, verified publisher, or custom |
| Environments | List of environments where used |
| Data Types | What data flows through the connector |
| Business Owner | Internal owner responsible |
| Risk Classification | Low, Medium, High, Critical |
Step 2: Assess Vendor Security
For each third-party vendor (non-Microsoft connectors), complete a security assessment:
- Request vendor documentation:
- SOC 2 Type II report (or equivalent)
- Security policies and procedures
- Data processing agreements
- Incident response procedures
-
Business continuity plans
-
Complete security questionnaire covering:
- Data encryption (transit and rest)
- Access controls and authentication
- Audit logging capabilities
- Compliance certifications (SOC 2, ISO 27001, FedRAMP)
- Data residency and sovereignty
- Subprocessor management
-
Incident notification procedures
-
Assign risk score based on:
- Security posture assessment results
- Data sensitivity classification
- Business criticality
- Regulatory requirements
Step 3: Document Vendor Relationships
Create a vendor relationship record for each third-party service:
- Vendor Profile:
- Company name and legal entity
- Primary contacts (sales, support, security)
- Contract dates (start, renewal, termination)
-
Service level agreements
-
Security Documentation:
- Latest SOC 2 report date
- Security questionnaire completion date
- Known security issues or findings
-
Remediation status
-
Operational Information:
- Integration architecture
- Data flows and retention
- Backup and recovery procedures
- Escalation procedures
Step 4: Configure Connector Policies
- Navigate to Power Platform Admin Center > Policies > Data policies
- Review existing DLP policies for connector classifications
- Update policies based on vendor risk assessments:
Policy Configuration by Risk Level:
| Risk Level | DLP Classification | Approval Required | Monitoring |
|---|---|---|---|
| Low | Business | No | Standard |
| Medium | Business (with restrictions) | Manager | Enhanced |
| High | Non-business (blocked by default) | Security + Compliance | Continuous |
| Critical | Blocked | Exception process only | Real-time alerts |
- For high-risk connectors requiring exceptions:
- Document business justification
- Obtain security team approval
- Implement compensating controls
- Set review expiration date
Step 5: Establish Monitoring
- Configure connector usage monitoring:
- Enable audit logging in Microsoft Purview
- Create alerts for unusual connector activity
-
Monitor for new connector deployments
-
Set up vendor performance tracking:
- Track uptime and availability
- Monitor latency and error rates
-
Review SLA compliance monthly
-
Establish review cadence:
| Review Type | Frequency | Participants |
|---|---|---|
| Connector Usage | Monthly | IT Governance |
| Vendor Performance | Quarterly | IT + Business Owners |
| Security Assessments | Annual (minimum) | Security + Compliance |
| Contract Reviews | 90 days before renewal | Procurement + Legal |
| Board Reporting | Quarterly | Executive + Compliance |
PowerShell Configuration
Connect to Power Platform
# Install Power Platform admin module
Install-Module -Name Microsoft.PowerApps.Administration.PowerShell -Force
# Connect to Power Platform
Add-PowerAppsAccount
# Verify connection
Get-AdminPowerAppEnvironment | Select-Object DisplayName, EnvironmentName | Format-Table
Get Connectors in Use
# Get all apps across environments
$environments = Get-AdminPowerAppEnvironment
$connectorUsage = @()
foreach ($env in $environments) {
Write-Host "Scanning environment: $($env.DisplayName)" -ForegroundColor Cyan
# Get apps in environment
$apps = Get-AdminPowerApp -EnvironmentName $env.EnvironmentName
foreach ($app in $apps) {
# Get app connections (requires app-level access)
Write-Host " App: $($app.DisplayName)"
}
# Get flows in environment
$flows = Get-AdminFlow -EnvironmentName $env.EnvironmentName
foreach ($flow in $flows) {
Write-Host " Flow: $($flow.DisplayName)"
}
}
Write-Host "`nTotal environments scanned: $($environments.Count)"
Export Connector Inventory
# Export detailed connector inventory
function Export-ConnectorInventory {
param(
[string]$OutputPath = ".\ConnectorInventory.csv"
)
$environments = Get-AdminPowerAppEnvironment
$inventory = @()
foreach ($env in $environments) {
# Get DLP policies for environment
$dlpPolicies = Get-DlpPolicy | Where-Object {
$_.environments.name -contains $env.EnvironmentName -or
$_.environmentType -eq "AllEnvironments"
}
$inventory += [PSCustomObject]@{
EnvironmentName = $env.DisplayName
EnvironmentId = $env.EnvironmentName
EnvironmentType = $env.EnvironmentType
DLPPoliciesApplied = ($dlpPolicies | Measure-Object).Count
AssessmentDate = Get-Date -Format "yyyy-MM-dd"
}
}
$inventory | Export-Csv -Path $OutputPath -NoTypeInformation
Write-Host "Exported connector inventory to: $OutputPath" -ForegroundColor Green
return $inventory
}
# Run export
$connectorInventory = Export-ConnectorInventory -OutputPath ".\VendorConnectorInventory.csv"
$connectorInventory | Format-Table
Review Connector Permissions
# Review DLP policies and connector classifications
function Get-ConnectorPolicyReport {
$dlpPolicies = Get-DlpPolicy
$report = @()
foreach ($policy in $dlpPolicies) {
Write-Host "`n=== Policy: $($policy.displayName) ===" -ForegroundColor Cyan
# Get connector groups
$businessGroup = $policy.connectorGroups | Where-Object { $_.classification -eq "General" }
$nonBusinessGroup = $policy.connectorGroups | Where-Object { $_.classification -eq "Confidential" }
$blockedGroup = $policy.connectorGroups | Where-Object { $_.classification -eq "Blocked" }
$report += [PSCustomObject]@{
PolicyName = $policy.displayName
PolicyType = $policy.environmentType
BusinessConnectors = ($businessGroup.connectors | Measure-Object).Count
NonBusinessConnectors = ($nonBusinessGroup.connectors | Measure-Object).Count
BlockedConnectors = ($blockedGroup.connectors | Measure-Object).Count
CreatedTime = $policy.createdTime
LastModified = $policy.lastModifiedTime
}
}
return $report
}
$policyReport = Get-ConnectorPolicyReport
$policyReport | Format-Table -AutoSize
$policyReport | Export-Csv -Path ".\DLPPolicyReport.csv" -NoTypeInformation
Monitor Custom Connectors
# Get all custom connectors across environments
function Get-CustomConnectorInventory {
$environments = Get-AdminPowerAppEnvironment
$customConnectors = @()
foreach ($env in $environments) {
$connectors = Get-AdminPowerAppConnector -EnvironmentName $env.EnvironmentName
foreach ($connector in $connectors) {
$customConnectors += [PSCustomObject]@{
ConnectorName = $connector.displayName
ConnectorId = $connector.name
Environment = $env.DisplayName
Publisher = $connector.properties.publisher
CreatedBy = $connector.properties.createdBy.displayName
CreatedTime = $connector.properties.createdTime
ApiDefinitionUrl = $connector.properties.apiDefinitionUrl
}
}
}
return $customConnectors
}
$customConnectors = Get-CustomConnectorInventory
Write-Host "`nCustom Connectors Found: $($customConnectors.Count)" -ForegroundColor Yellow
$customConnectors | Format-Table -AutoSize
$customConnectors | Export-Csv -Path ".\CustomConnectorInventory.csv" -NoTypeInformation
Financial Sector Considerations
Regulatory Mapping
| Regulation | Requirement | Control Implementation |
|---|---|---|
| OCC 2011-12 | Third-party risk management for banks | Comprehensive vendor vetting, ongoing monitoring, board reporting |
| FFIEC IT Examination Handbook | Outsourcing technology services | Due diligence, contract requirements, business continuity planning |
| Interagency Third-Party Guidance (2023) | Sound risk management throughout relationship lifecycle | Planning, due diligence, contract negotiation, ongoing monitoring, termination |
| GLBA 501(b) | Safeguard customer information | Vendor data protection requirements, security assessments |
| SOX 404 | Internal controls over financial reporting | Vendor controls testing, SOC reports review |
| FINRA 4511 | Books and records requirements | Vendor data retention, access to records |
| Fed SR 11-7 | Model risk management (for AI vendors) | AI/ML vendor validation, model documentation |
Interagency Third-Party Risk Management Guidance (June 2023)
The joint OCC, Federal Reserve, and FDIC guidance establishes the current standard for third-party risk management at banking organizations. Key requirements for AI agent vendor relationships:
| Lifecycle Stage | Requirements | AI Agent Considerations |
|---|---|---|
| Planning | Sound planning for third-party relationships | Identify AI/connector needs, assess alternatives |
| Due Diligence | Comprehensive assessment before engagement | AI-specific security review, data handling assessment |
| Contract Negotiation | Appropriate contractual protections | AI audit rights, model documentation, incident response |
| Ongoing Monitoring | Continuous oversight throughout relationship | Connector usage monitoring, performance tracking |
| Termination | Planning for relationship end | Data return/destruction, transition planning |
Tier-Specific Vendor Assessment
| Assessment Area | Tier 1 (Personal Productivity) | Tier 2 (Team Collaboration) | Tier 3 (Enterprise Managed) |
|---|---|---|---|
| Vendor Vetting | Self-certification | Basic questionnaire | Comprehensive assessment |
| Security Documentation | Optional | SOC 2 recommended | SOC 2 Type II required |
| Contract Review | Standard terms | Legal review | Security addendum required |
| Monitoring Frequency | Annual | Quarterly | Continuous |
| Audit Rights | Not required | Recommended | Required |
| Exit Planning | Optional | Documented | Tested annually |
| Board Reporting | None | Summary | Detailed risk report |
FSI Example: Regional Bank Vendor Risk Program
Organization: Regional Community Bank
Environment: FSI-Zone3-Core-Banking-Agents
Vendor Risk Management Configuration:
Program Scope:
Tier 1 Vendors: Critical services, direct customer data access
Tier 2 Vendors: Important services, limited data access
Tier 3 Vendors: Convenience services, no sensitive data
Third-Party Connectors:
Approved Connectors:
Microsoft First-Party:
- Microsoft Dataverse
- SharePoint Online
- Microsoft Teams
- Office 365 Users
- Azure Key Vault
Risk Level: Low
Assessment: Annual
Certified Connectors:
- Salesforce (CRM integration)
- DocuSign (document signing)
- Adobe Sign (backup signing)
Risk Level: Medium
Assessment: Semi-annual
SOC 2 Required: Yes
Restricted Connectors:
- All social media connectors
- Consumer cloud storage
- Public AI services without BAA
Assessment Requirements:
All Tier 1 Vendors:
- SOC 2 Type II report (current within 12 months)
- Completed security questionnaire (200+ questions)
- On-site assessment (every 2 years)
- Financial viability review
- Business continuity test results
All Tier 2 Vendors:
- SOC 2 Type II report
- Completed security questionnaire (50+ questions)
- Virtual assessment acceptable
All AI/ML Vendors:
- Model documentation and validation
- Data handling and retention policies
- Bias testing results
- Explainability documentation
Contract Requirements:
Standard Clauses:
- Data protection and encryption requirements
- Incident notification (24 hours for critical)
- Audit rights (annual minimum)
- Subprocessor approval requirements
- Data return/destruction on termination
AI-Specific Clauses:
- Model change notification
- Training data requirements
- Output monitoring rights
- Human oversight provisions
Monitoring Program:
Continuous Monitoring:
- Connector usage analytics
- Error rate tracking
- Performance SLA compliance
Periodic Reviews:
Quarterly:
- Vendor performance scorecards
- Security finding status
- Contract compliance
Annual:
- Full risk reassessment
- Contract renewal evaluation
- Board risk report
Governance:
Vendor Risk Committee:
Chair: Chief Risk Officer
Members:
- CISO
- Chief Compliance Officer
- Head of Procurement
- Business Unit Representatives
Meeting Frequency: Monthly
Escalation Thresholds:
Board Notification:
- New Tier 1 vendor approval
- Significant vendor incidents
- Material contract changes
- Vendor termination (Tier 1)
Zone-Specific Configuration
Zone 1 (Personal Productivity):
- Apply a baseline minimum of Vendor and Third-Party Risk Management controls that impacts tenant-wide safety (where applicable), and document any exceptions for personal agents.
- Avoid expanding scope beyond the user’s own data unless explicitly justified.
- Rationale: reduces risk from personal use while keeping friction low; legal/compliance can tighten later.
Zone 2 (Team Collaboration):
- Apply the control for shared agents and shared data sources; require an identified owner and an approval trail.
- Validate configuration in a pilot environment before broader rollout; retain evidence (screenshots/exports/logs).
- Rationale: shared agents increase blast radius; controls must be consistently applied and provable.
Zone 3 (Enterprise Managed):
- Require the strictest configuration for Vendor and Third-Party Risk Management controls and enforce it via policy where possible (not manual-only).
- Treat changes as controlled (change ticket + documented testing); retain evidence (screenshots/exports/logs).
- Rationale: enterprise agents handle the most sensitive content and are the highest audit/regulatory risk.
Verification & Testing
| Step | Action | Expected Result |
|---|---|---|
| 1 | Review connector inventory document | Complete list of all third-party connectors |
| 2 | Check vendor security assessments | Current assessments for all Tier 1/2 vendors |
| 3 | Verify contracts have security clauses | Required clauses present in all vendor contracts |
| 4 | Confirm vendor access is monitored | Audit logs showing connector activity |
| 5 | Test DLP policy enforcement | Blocked connectors cannot be used |
| 6 | Review board reporting | Quarterly vendor risk reports delivered |
| 7 | Verify incident response procedures | Documented and tested for vendor issues |
Troubleshooting & Validation
Issue: Unable to Identify All Third-Party Connectors
Symptoms: Incomplete connector inventory, unknown connectors discovered during audits
Solutions:
- Run PowerShell scripts to enumerate connectors across all environments
- Review Power Platform analytics for connector usage
- Check audit logs in Microsoft Purview for connection activity
- Enable connector activity alerts for new deployments
- Survey environment admins for custom connector usage
Issue: Vendor Fails to Provide SOC 2 Report
Symptoms: Vendor cannot provide required security documentation
Solutions:
- Accept alternative certifications (ISO 27001, FedRAMP)
- Request bridge letter if report is pending
- Conduct independent security assessment
- Implement compensating controls (enhanced monitoring)
- Escalate to vendor risk committee for risk acceptance or termination
Issue: Custom Connector Security Concerns
Symptoms: Custom connectors created without security review
Solutions:
- Implement pre-deployment security review process
- Enable Managed Environments to control solution deployment
- Use solution checker to identify security issues
- Require code review for custom connector APIs
- Block custom connector creation except in designated environments
Issue: Vendor Incident Notification Delayed
Symptoms: Vendor security incident not reported timely
Solutions:
- Review contract for notification requirements
- Assess impact to organization and report internally
- Document timeline of vendor notification
- Update vendor risk score based on incident handling
- Consider contract remediation or termination
Issue: DLP Policies Not Blocking Connectors as Expected
Symptoms: Users able to use connectors that should be blocked
Solutions:
- Verify DLP policy is applied to correct environments
- Check for conflicting policies (least restrictive wins)
- Confirm connector is correctly classified in policy
- Wait for policy propagation (up to 1 hour)
- Verify environment is marked as Managed
Additional Resources
- Third-Party Connector Management
- Data Loss Prevention Policies
- Custom Connectors Overview
- Connector Certification Process
- Power Platform Admin PowerShell
- Microsoft Purview Audit Solutions
Related Controls
| Control | Relationship |
|---|---|
| Control 1.4: Advanced Connector Policies | Connector-level security policies |
| Control 1.5: Custom Connector Certification | Custom connector security review |
| Control 1.6: DLP Policies | Data Loss Prevention configuration |
| Control 2.1: Managed Environments | Environment-level governance |
| Control 2.2: Environment Groups | Group-level policies |
| Control 2.3: Change Management | Solution deployment controls |
| Control 3.4: Audit Logging | Activity monitoring |
Support & Questions
For implementation support or questions about this control, contact:
- AI Governance Lead: Governance direction and policy
- Compliance Officer: Regulatory requirements and reporting
- Security Team: Vendor security assessments
- Procurement: Contract management and vendor relationships
- Technical Implementation Team: Platform configuration
Updated: Dec 2025
Version: v1.0 Beta (Dec 2025)
UI Verification Status: ❌ Needs verification