GDPR, NIS 2, and DORA converge on one problem: Third-party risk

Written by
No items found.
Reviewed by
No items found.

Accelerating security solutions for small businesses 

Tagore offers strategic services to small businesses. 

A partnership that can scale 

Tagore prioritized finding a managed compliance partner with an established product, dedicated support team, and rapid release rate.

Standing out from competitors

Tagore's partnership with Vanta enhances its strategic focus and deepens client value, creating differentiation in a competitive market.

Regulators no longer ask whether you manage vendor risk—they assume you do. And if you don’t, you pay for it.

Three independent EU regulations—the GDPR, NIS 2 directive, and Digital Operations Resilience Act (DORA)—stress that it’s your responsibility to manage third-party risk. These regulations offer security frameworks that support different industries and risk profiles, but they all lead with strict fines and pressure to enforce third-party risk management.

Under the GDPR, gaps in core security and operational controls drove 25% of the fines in 2025, up 40% year over year. DORA emphasizes third-party oversight, too, with 34% of financial firms calling its requirements among the hardest to meet. NIS 2 has also explicitly expanded its requirements to introduce mandatory cybersecurity obligations across the supply chain.

When three separate regulations align on a shared expectation, it signals a structural business risk and makes vendor management an “always on” activity. This reflects in Vanta’s 2025 State of Trust Report, with more than two thirds of organizations spending significant time on security reviews and worrying about vendor breaches.

Third-party risk is more regulated now

About five years ago, third-party risk management (TPRM) was mostly treated as a best practice, but repeated large-scale vendor security incidents have since turned it into an enforced obligation.

In 2023, MOVEit suffered from an exploited, undetected zero-day vulnerability, resulting in breaches for more than 2,700 organizations. Because the software was used in workflows involving sensitive data, the impact didn’t stop with the vendor: it created downstream liability for many organizations, triggering regulatory scrutiny and $10B+ in remediation costs across sectors.

MOVEit is only one of several vendor-related breaches in recent years. Regulators have responded accordingly by formalizing TPRM requirements across frameworks across the EU regulatory space, where vendor risk accountability is enforced:

  • GDPR: Under Article 28, controllers are responsible for ensuring their processors implement appropriate security measures, and remain liable if they don’t
  • NIS 2: Article 21 requires organizations to assess and manage cybersecurity risks across their vendor ecosystem
  • DORA: ICT third-party risk management is a standalone pillar with thorough oversight requirements

{{cta_withimage14="/cta-blocks"}} | GDPR compliance checklist

Vendor risk management is a visibility problem

For many teams, vendor risk is still mostly invisible. This is concerning because you cannot manage what you can’t see.

Vanta’s State of Trust Report (2025) found that organizations spend nine working weeks a year on vendor risk assessments and security reviews. Yet 56% still experienced a vendor breach in the past year. In the EU, a PwC Luxembourg survey found that 58% of firms believe that their third-party providers still have major compliance gaps between effort and outcomes.

Plainly, most organizations don't have enough continuous visibility into third-party threats, which shows up in several ways:

  • No centralized inventory of third parties and their access
  • Compliance assessed at onboarding, then rarely revisited
  • Reliance on static questionnaires and self-reported attestations
  • No real-time overview of vendor security posture

Outdated, manual-heavy vendor risk management practices can create issues. While third-party risk changes continuously, many teams still rely on point-in-time, fragmented reviews which limit their ability to make time-sensitive risk decisions. EU regulations updated requirements around ongoing monitoring, incident reporting, and more to address these gaps in existing TPRM models.

{{cta_withimage20="/cta-modules"}} | Vendor Risk Assessment Checklist

TPRM obligations: How GDPR, NIS 2, and DORA overlap

While the three regulations differ in scope and terminology, their third-party risk obligations align:

Regulation Third-party risk obligations
GDPR Data processing agreements, processor due diligence, and breach notification obligations (the 72-hour window applies to the controller even if the processor is breached)
NIS 2 Supply chain risk assessments, security criteria in vendor contracts, and incident reporting across downstream dependencies
DORA ICT third-party risk registers, ongoing monitoring for critical service providers, vendor offboarding procedures, and concentration risk management (e.g., avoiding over-reliance of key vendors)

All three require continuous vendor assessments, security obligations built into contracts, and incident reporting across the entire vendor ecosystem.

Third-party risk management work shouldn’t be siloed across frameworks. Managing controls for each in isolation can effectively triple the effort for the same results. Streamlining the efforts also reduces the oversight risk that can trigger compounding violations.

Bonus resource: Check out the NIS 2 compliance checklist.

How much a GDPR, NIS 2, or DORA violation can cost

Third-party breaches under EU regulations can result in significant penalties:

Regulation Penalties
GDPR Up to €20M or 4% of global turnover for the previous fiscal year. Since 2018, cumulative fines have exceeded €7.1B
NIS 2 Up to €10M or 2% of global turnover for essential entities, with potential personal liability for senior management
DORA Up to 2% of global annual turnover for organizations, or up to €1M for individuals. Critical ICT providers may face fines of up to €5M, plus an additional daily penalty of 1% of average daily turnover.

The actual impact on your organization balloons when a single violation results in compounded liability with serious financial and operational consequences. That financial liability can scale rapidly if you face DORA penalties, as the regulation’s daily accrued penalties of up to €5M create a “burn rate” that few balance sheets can sustain. Beyond the fines, organizations face a contractual indemnity gap. Vendors typically cap their liability at a fixed amount, which rarely reflects the true cost of a failure—leaving your organization to absorb most of the regulatory and financial impact.

Furthermore, the reputational damage is permanent. Customers don’t always know the difference between your breach and a vendor’s. Meanwhile, B2B buyers now view a lack of vendor visibility as a disqualifying security failure.

When regulators—and customers—hold you accountable for your vendors’ security, trust just has to be continuously verified, not annually.

Effective vendor risk management

If the core vendor management challenge is visibility, then your goal shouldn’t be more assessments or reports. Instead, consider switching from a static program to a more systemic one—where continuous, integrated oversight is systemized, and you get better risk signals with less manual effort.

Vanta, the agentic trust management platform, is designed to support the shift to automated, ongoing oversight of your third-party risks. Some of Vanta’s core TPRM features you can use to build an effective third-party risk management program include:

  • Centralized vendor inventory for risk tiering and classification. 
  • Automated evidence collection that replaces static and time-consuming vendor assessment questionnaires.
  • Continuous monitoring of vendor security posture over outdated, point-in-time reviews. 
  • Control mapping across GDPR, NIS 2, and DORA to eliminate redundant work.
  • Templates and policies to help you embed contractual security expectations into vendor agreements.

As one of today’s leading vendor risk management solutions, Vanta can help you operationalize your TPRM program within a unified platform powered by 400+ integrations for continuous risk detection and vendor oversight. Your dedicated, always-on Vanta TPRM Agent can also help you with remediation, evidence management, follow-ups, and more.

Request a demo to see how it works.

Three regulators, one common direction for third-party risks

GDPR, NIS 2, and DORA all reinforce the same expectation: 24/7 vendor risk accountability. Traditional TPRM approaches can’t offer this level of assurance. Static evidence and point-in-time reviews from a month ago have no value if you have to answer for real-time risks in your supply chain.

That brings us to the most obvious question: if regulators by default think your vendors are a problem, do you have the visibility to prove otherwise?

Organizations navigating Europe’s regulatory landscape must be able to adapt to this shift quickly and treat vendor risk as a continuous discipline instead of a procurement checkbox. Platforms like Vanta are playing an integral role in integrating faster system-driven visibility into third-party risk in a way you can show stakeholders.

{{cta_simple5="/cta-blocks"}} | TPRM product page

Access Review Stage Content / Functionality
Across all stages
  • Easily create and save a new access review at a point in time
  • View detailed audit evidence of historical access reviews
Setup access review procedures
  • Define a global access review procedure that stakeholders can follow, ensuring consistency and mitigation of human error in reviews
  • Set your access review frequency (monthly, quarterly, etc.) and working period/deadlines
Consolidate account access data from systems
  • Integrate systems using dozens of pre-built integrations, or “connectors”. System account and HRIS data is pulled into Vanta.
  • Upcoming integrations include Zoom and Intercom (account access), and Personio (HRIS)
  • Upload access files from non-integrated systems
  • View and select systems in-scope for the review
Review, approve, and deny user access
  • Select the appropriate systems reviewer and due date
  • Get automatic notifications and reminders to systems reviewer of deadlines
  • Automatic flagging of “risky” employee accounts that have been terminated or switched departments
  • Intuitive interface to see all accounts with access, account accept/deny buttons, and notes section
  • Track progress of individual systems access reviews and see accounts that need to be removed or have access modified
  • Bulk sort, filter, and alter accounts based on account roles and employee title
Assign remediation tasks to system owners
  • Built-in remediation workflow for reviewers to request access changes and for admin to view and manage requests
  • Optional task tracker integration to create tickets for any access changes and provide visibility to the status of tickets and remediation
Verify changes to access
  • Focused view of accounts flagged for access changes for easy tracking and management
  • Automated evidence of remediation completion displayed for integrated systems
  • Manual evidence of remediation can be uploaded for non-integrated systems
Report and re-evaluate results
  • Auditor can log into Vanta to see history of all completed access reviews
  • Internals can see status of reviews in progress and also historical review detail
FEATURED VANTA RESOURCE

The ultimate guide to scaling your compliance program

Learn how to scale, manage, and optimize alongside your business goals.