Your Vendors Are Part of Your Attack Surface Whether You Manage Them or Not
Every third-party connection your organisation has made is a potential entry point for attackers. Scrutex continuously assesses the real-world security posture of your vendors, suppliers, and partners, giving your team accurate, up-to-date risk intelligence rather than a spreadsheet of self-reported answers that may be months out of date.
The Problem With How Vendor Risk Is Managed Today
Most organisations manage third-party risk the same way they have for the past decade: send a questionnaire, receive a completed questionnaire, file the completed questionnaire, repeat annually. The problem is that a questionnaire tells you what a vendor claims about their security posture on the day they filled it in. It tells you nothing about what their actual external exposure looks like today, this week, or at the moment an attacker decides to use them as a path into your environment.
Supply chain attacks have become one of the most effective tactics available to threat actors precisely because of this gap. Attackers know that organisations scrutinise their own perimeters far more carefully than they scrutinise the perimeters of the vendors they trust. A single compromised supplier with access to your production systems, customer data, or internal network can render your own security investment irrelevant.
Scrutex closes the gap between what vendors report and what they actually look like from the outside. Every vendor assessment is backed by live reconnaissance of that vendor's external attack surface, so your risk scores reflect reality rather than paperwork.
Key Challenges
The Questionnaire Is Not the Whole Picture
Completed questionnaires reflect a vendor's intended security posture. They rarely capture the misconfigured subdomain that went live last month, the SSL certificate that expired two weeks ago, or the employee credentials that appeared in a breach database yesterday. Scrutex's live CTEM correlation gives every questionnaire response a real-world counterpart.
Vendor Portfolios Have Become Unmanageably Large
The average enterprise works with hundreds of third-party vendors. Fintech ecosystems, cloud supply chains, logistics networks, and software dependencies each add to the count. Running thorough manual assessments at this scale is not feasible, which means most vendor programmes end up prioritising the largest vendors while accepting unknown risk from everything else. Scrutex's automated assessment capability applies the same rigour across your entire vendor portfolio regardless of size.
Risk Changes Between Annual Reviews
A vendor who passed their assessment in January may have introduced significant exposure by March. New subdomains, new cloud infrastructure, leadership changes, and third-party breaches all affect a vendor's risk posture between your scheduled reviews. Continuous monitoring means you know about changes as they happen, not twelve months later.
Onboarding New Vendors Creates a Visibility Window
Every new vendor relationship begins with a period where you have limited information about their security posture. The faster your business moves, the more frequently new vendors are onboarded, and the harder it becomes to complete thorough due diligence before they are granted access. Scrutex's rapid assessment capability compresses that window from weeks to hours.
Regulatory Requirements Are Expanding
Frameworks including DORA, APRA CPS 234, PCI DSS v4.0, and the NIS2 Directive are increasingly explicit about third-party risk management obligations. Regulators no longer accept an annual questionnaire as sufficient evidence of a mature vendor risk programme. Scrutex generates the continuous assessment documentation that satisfies these requirements.
How Scrutex Approaches Vendor Risk
Scrutex's Vendor Insights module is built around one core idea: that the most accurate measure of a vendor's security posture is what their environment actually looks like from the outside, not what they write on a form. Every assessment combines structured questionnaire-based evaluation with live external reconnaissance of that vendor's internet-facing infrastructure. The result is a risk picture that reflects the real world.
External Attack Surface Mapping
External attack surface mapping for each vendor, including all identified internet-facing assets, open ports, SSL certificate health, and email security configuration.
Vulnerability Identification
Vulnerability identification on vendor-controlled infrastructure, including unpatched systems, outdated web technologies, and misconfigured services that are visible from the public internet.
Dark Web Monitoring
Dark web monitoring for vendor-associated credential leaks and data exposures, surfacing incidents at third-party vendors that could affect your environment before the vendor has necessarily detected or disclosed them.
Questionnaire-Based Assessment
Questionnaire-based assessment using templates aligned to the frameworks most relevant to your sector, including ISO 27001, SOC 2, PCI DSS, NIST 800-53, HIPAA, and sector-specific variations.
AI-Assisted Risk Scoring
AI-assisted risk scoring that aggregates questionnaire responses and live reconnaissance data into a single vendor risk score, with detailed breakdowns by risk category for your security team and executive reporting.
Unlimited Assessment Capacity
Unlimited assessment capacity, so there is no reason to deprioritise smaller vendors in your portfolio. Every vendor can be assessed with the same depth applied to your most critical relationships.
Ongoing Monitoring
Ongoing monitoring after the initial assessment, with alerts when a vendor's external posture changes materially, so your vendor risk picture stays current between scheduled reviews.
The Live CTEM Correlation Difference
Standard vendor risk platforms score vendors based on what they report or on passive signals gathered from public sources. Scrutex goes further by running the same continuous threat exposure management process against your vendor's external infrastructure that it runs against yours. When your vendor has a dangling subdomain, a credential leak, or an unpatched internet-facing service, you see it in your vendor risk dashboard at the same time you would if it were your own infrastructure. This makes your vendor risk programme a genuine security control rather than a compliance exercise.
Regulatory Alignment
Vendor risk management is no longer treated as optional by regulators in most major markets. These are some of the frameworks that explicitly address third-party and supply chain security obligations.
DORA
EUICT third-party risk management, contractual requirements, oversight of critical providers
NIS2 Directive
EUSupply chain security, third-party dependency management
APRA CPS 234
AustraliaInformation security capability of related parties and service providers
PCI DSS v4.0 (Req 12.8)
GlobalManagement of service providers with access to cardholder data
ISO 27001 (A.15)
GlobalSupplier relationships, third-party security requirements
SOC 2 (Availability, Confidentiality)
USA / GlobalVendor management and monitoring controls
NIST CSF 2.0 (GV.SC)
USA / GlobalCybersecurity supply chain risk management
HIPAA
USABusiness Associate Agreement requirements and assessment
MAS TRM Guidelines
SingaporeThird-party risk oversight and outsourcing requirements
NCSC CAF
UKSupply chain dependencies and risk management
Real Results
What Vendor Risk Looks Like in Practice
A financial services organisation has 340 vendors in their risk register. Their largest twenty-five are assessed annually with detailed questionnaires. The remaining three hundred and fifteen receive a lighter-touch review every two years, if at all. One of those lower-tier vendors is a payroll platform used across the business. In March, that vendor's remote access infrastructure is compromised by an attacker who harvests the credentials of every client organisation using their support portal.
With Scrutex, the payroll vendor's external posture is monitored continuously alongside the organisation's tier-one vendors. The compromised remote access infrastructure is flagged within hours of the attack becoming visible on the open internet. The organisation's security team receives an alert, revokes the vendor's access, and avoids a breach. Not because the vendor told them something was wrong. Because Scrutex could see it independently.
Ready to see Scrutex in action?
Sign up free or book a live demo. Most teams are up and running in under 10 minutes.