Skip to main content
RSS Feed
·10 min read

Third-Party Risk Management for RIAs: What Reg S-P Requires and How to Automate It

The amended Reg S-P does not just require you to protect your own systems. It requires you to ensure that every service provider with access to customer information protects theirs. Most RIAs have 15 to 30 vendors they have never formally assessed. The SEC expects you to know who they are, what data they touch, and whether their contracts include the right clauses.

What Reg S-P requires for vendor oversight

The Reg S-P amendments added explicit requirements for how RIAs manage third-party service providers. Three obligations stand out:

The SEC holds the RIA responsible for vendor failures. If your CRM vendor gets breached and you never assessed their security or required breach notification in the contract, that is your problem in the exam room.

Who counts as a "service provider"

More vendors than you think. If a company has access to, stores, or processes any of your client information, they are a service provider under Reg S-P. For a typical RIA, this includes:

When firms actually sit down and inventory their vendors, the number is almost always between 15 and 30. Most have never done the exercise. They could not produce a complete vendor list if an examiner asked for one tomorrow.

The 72-hour clause gap

This is the most immediate compliance risk for most RIAs. The 72-hour breach notification requirement is new with the Reg S-P amendments, but the majority of vendor contracts were signed before these amendments existed. That means:

Unless you explicitly update these contracts, your vendors have no obligation to tell you about a breach within 72 hours. If your MSP discovers a breach on Friday and tells you the following Thursday, you have already blown past the notification window. The SEC does not care that your vendor was slow. They care that you did not have the contractual mechanism to prevent it.

What a compliant vendor oversight program looks like

A vendor oversight program that would satisfy an SEC examiner has five components:

1. Vendor inventory

A complete, current list of every service provider that has access to or processes client information. For each vendor: what data they access, how they access it, and when the relationship was last reviewed. This is your foundation. You cannot manage risk you have not identified.

2. Risk tiering

Not every vendor carries the same risk. Your MSP, who has admin credentials to your entire environment, is a different risk than your phone system. Tier your vendors into categories — critical, high, medium, low — based on the sensitivity and volume of data they access, whether they have direct system access, and the impact of a breach at that vendor.

3. Due diligence documentation

For each vendor, documented evidence that you assessed their security posture. This might include reviewing their SOC 2 report, confirming they have cybersecurity insurance, verifying their incident response procedures, or sending a security questionnaire. The depth should match the risk tier — a critical vendor like your MSP needs more scrutiny than a low-risk vendor like your office supply company.

4. Contract review for breach notification clauses

Every contract with a service provider that touches client data needs a 72-hour breach notification clause. Review each contract. Flag the ones that are missing the clause. Negotiate amendments. Track which contracts have been updated and which are still outstanding. If you want to know what else to ask your MSP, start with the notification timeline.

5. Annual reassessment

Vendor risk is not static. Your CRM vendor that passed your assessment last year may have been acquired, changed their security practices, or experienced an incident. Set a calendar for annual reviews. For critical-tier vendors, consider semi-annual reviews or continuous monitoring.

Why most RIAs do not have one

If vendor oversight is a regulatory requirement, why do so few RIAs have a formal program? A few reasons:

How BlackSheep automates vendor risk management

BlackSheep's RIA compliance platform includes a vendor risk management module built specifically for the Reg S-P requirements. It handles the parts that make this program tedious to maintain manually:

You can run a free security scan to see where your firm stands before committing to anything.

Stop managing vendor risk in spreadsheets.

Automate vendor oversight with BlackSheep

Free download: SEC Reg S-P compliance checklist

27-point checklist covering every Reg S-P requirement. Know exactly where your firm stands before the June 2026 deadline.

No spam. Unsubscribe anytime.