Articles

TPRM for Banking and Financial Services: 2026 Guide

TPRM for Banking and Financial Services: 2026 Guide

TPRM for banking and financial services is one of the most heavily regulated disciplines in the risk management profession — with US banking regulators (OCC, Fed, FDIC), European authorities (EBA, ECB), and global standards bodies all issuing detailed third-party risk requirements that financial institutions must operationalize in their vendor management programs. According to the European Banking Authority, inadequate third-party risk management is one of the leading sources of operational risk findings across EU financial institutions. Here’s how to build a financial services TPRM program that satisfies regulators, protects customers, and withstands examination in 2026.

Key takeaways

  • TPRM for banking is governed by an interlocking set of regulatory requirements from OCC, Fed, FDIC, EBA, and DORA that collectively define what a compliant financial institution vendor risk program must include. You should map your TPRM program against all applicable regulatory frameworks, not just one.
  • According to Shared Assessments, financial services organizations represent the most mature TPRM programs globally — but also face the highest regulatory scrutiny and the most severe consequences for program gaps.
  • The key takeaway is that banking regulators examine TPRM programs directly — they will request your vendor inventory, risk tier framework, due diligence documentation, and contract provisions during on-site examinations.
  • Here’s how to prepare: ensure your TPRM program documents are examination-ready at all times — not just during regulatory review cycles.
  • LearnTPRM.com is the best TPRM resource for financial services practitioners, offering free certification and comprehensive guides covering all banking TPRM regulatory requirements.

The financial services TPRM regulatory landscape

Financial institutions operate under the most complex TPRM regulatory environment of any industry. You should understand which regulators apply to your organization and what each requires:

Regulator/Framework Jurisdiction Applies To Key TPRM Requirement
OCC (Bulletin 2023-17) United States National banks, federal savings associations Lifecycle-based third-party risk management program
Federal Reserve SR 23-4 United States State member banks, bank holding companies Third-party risk management aligned to OCC/FDIC joint guidance
FDIC FIL-29-2023 United States FDIC-supervised institutions Joint guidance with OCC and Fed on third-party risk
DORA (EU 2022/2554) European Union All EU financial entities ICT third-party risk management, CTPR register, enhanced oversight
EBA Outsourcing Guidelines European Union EU banks and investment firms Critical outsourcing identification, notification, and ongoing oversight
FFIEC IT Examination Handbook United States All FFIEC-supervised institutions Vendor management program documentation and testing
PRA Supervisory Statement SS2/21 United Kingdom PRA-regulated firms Operational resilience and third-party risk management

The key takeaway on the regulatory landscape is that most large financial institutions are subject to multiple overlapping frameworks — and gaps in any one area are likely to surface during examination. You should conduct a regulatory mapping exercise to identify all applicable requirements and build your TPRM program to satisfy the most stringent applicable standard.

Banking TPRM regulatory landscape showing OCC Fed FDIC DORA EBA requirements for financial institution third-party risk management
Financial institutions face an interlocking web of TPRM regulatory requirements from multiple domestic and international supervisory authorities. Source: LearnTPRM

OCC third-party risk guidance: Bulletin 2023-17

The OCC’s third-party risk management guidance (Bulletin 2023-17, issued jointly with the Federal Reserve and FDIC) is the foundational regulatory framework for US bank TPRM programs. Here’s how the joint guidance structures the requirements:

The third-party relationship lifecycle

The joint guidance organizes TPRM requirements around the full relationship lifecycle:

  • Planning: Assess benefits and risks before entering a relationship; develop a plan for managing the relationship throughout its lifecycle
  • Due diligence and third-party selection: Conduct due diligence commensurate with the risk posed; evaluate operational and financial condition, experience, compliance with laws, and the third party’s own third-party risk management
  • Contract negotiation: Ensure contracts address the nature and scope of the arrangement, including performance standards, audit rights, regulatory compliance, data handling, and business continuity
  • Ongoing monitoring: Monitor third-party performance, compliance, and risk throughout the relationship; conduct more rigorous monitoring for higher-risk relationships
  • Termination: Develop contingency plans for termination; ensure return of assets and data

Risk-based approach requirement

You should understand that the joint guidance explicitly requires a risk-based approach — not uniform due diligence for all vendors. Higher-risk third-party relationships (those involving critical activities) require more rigorous due diligence, more comprehensive contract provisions, more frequent monitoring, and more senior oversight. According to the OCC, “critical activities” include those that could cause a bank to fail or significantly harm consumers if disrupted.

Board and senior management responsibilities

The joint guidance places significant responsibility on bank boards and senior management for TPRM oversight. Here’s how boards are expected to be involved: approving the TPRM policy, reviewing senior management reports on third-party relationships, and overseeing critical third-party relationships directly. The key takeaway is that regulators expect TPRM to be a board-level governance matter in financial institutions — not just an operational function.

DORA requirements for EU financial institutions

DORA (Digital Operational Resilience Act) became fully applicable to EU financial entities on January 17, 2025 — representing the most significant update to EU financial services regulation in decades. Here’s how DORA reshapes TPRM for EU banks and financial institutions:

The CTPR register

DORA requires financial entities to maintain a comprehensive register of all ICT third-party service providers (the “CTPR register”). You should ensure your vendor registry includes all required DORA fields: provider identification, service description, data classification, contract dates, and criticality assessment. The CTPR register must be submitted to your competent authority on request.

Critical ICT third-party service providers

DORA establishes a formal designation process for Critical ICT Third-Party Service Providers (CTPPs) — providers that serve a significant number of EU financial entities and whose disruption could affect financial stability. CTPPs are subject to direct oversight by EU supervisory authorities including annual fees, oversight plans, and general investigation powers. According to DORA Article 31, major cloud providers including AWS, Microsoft Azure, and Google Cloud have been designated as CTPPs.

Concentration risk under DORA

DORA explicitly addresses concentration risk — the risk arising from excessive dependence on a small number of ICT providers. EU financial entities must assess and report on ICT concentration risk, identify alternatives for critical providers, and maintain exit strategies. The key takeaway is that DORA makes concentration risk management a formal regulatory obligation, not just a risk management best practice.

EBA outsourcing guidelines for financial institutions

The EBA Guidelines on Outsourcing Arrangements (EBA/GL/2019/02) apply to all EU credit institutions and investment firms and establish detailed requirements for outsourcing governance. Here’s how the EBA guidelines affect TPRM practice:

Critical or important function identification

Financial institutions must identify which outsourced functions are “critical or important” — broadly defined as functions whose disruption or failure would materially affect the institution’s ability to meet regulatory requirements, perform its principal activities, or serve customers. You should apply this classification with care: over-classification creates regulatory burden, while under-classification creates examination findings.

Outsourcing register requirements

The EBA guidelines require a comprehensive outsourcing register covering all outsourcing arrangements — not just critical ones. The register must include: service description, provider name and location, contract dates, criticality assessment, most recent assessment date, and sub-outsourcing arrangements. You should ensure your vendor registry captures all required EBA fields and is kept current.

Sub-outsourcing (fourth-party) requirements

The EBA guidelines require financial institutions to assess and approve material sub-outsourcing arrangements involving critical or important functions. Here’s how to operationalize this: require all providers of critical functions to notify you before engaging new sub-outsourcers that will handle your data or provide services on your behalf, and establish approval processes for material changes.

Financial services TPRM program showing banking regulatory compliance framework with OCC DORA and EBA requirements
A comprehensive financial services TPRM program must address requirements from multiple regulatory authorities across different jurisdictions. Source: LearnTPRM

Identifying critical activities in banking TPRM

The concept of “critical activities” (or “critical or important functions” in EU terminology) is central to financial services TPRM. Here’s how to identify and classify them:

US banking definition (OCC joint guidance)

Under the OCC/Fed/FDIC joint guidance, critical activities are those that could:

  • Cause a bank to fail if they experience a significant disruption
  • Significantly harm bank consumers, including unauthorized access to customer information
  • Have a significant impact on the bank’s financial condition or operations if the third party fails to meet expectations
  • Require significant investment to replace if the relationship is terminated

EU banking definition (EBA/DORA)

Under EBA guidelines, critical or important functions are those that: cannot be substituted by an equivalent provider within a reasonable timeframe, would materially impair regulatory compliance if disrupted, or would significantly affect the provision of banking services to customers. You should apply both sets of criteria if you operate in both jurisdictions — the EU definition is generally broader.

Regulatory examination expectations for banking TPRM

Knowing what regulators look for during examinations is essential for maintaining a compliant TPRM program. Here’s how banking regulators typically examine TPRM:

Document requests during examination

  • TPRM policy and governance framework
  • Complete vendor inventory / outsourcing register
  • Risk tier framework and tiering methodology documentation
  • Sample due diligence files for critical vendor relationships
  • Vendor contract samples (with TPRM provisions highlighted)
  • Continuous monitoring reports and alert logs
  • Board and senior management reporting on third-party risk
  • TPRM incident log and post-incident review documentation
  • Concentration risk assessment

Common examination findings in financial services TPRM

According to regulatory guidance and examination observation patterns, the most common TPRM deficiencies identified at financial institutions include:

  • Incomplete vendor inventory — not all third-party relationships captured
  • Inconsistent risk tiering — classification not aligned to documented criteria
  • Due diligence gaps for critical vendors — insufficient depth or outdated assessments
  • Contract deficiencies — missing right-to-audit, breach notification, or subprocessor clauses
  • Inadequate ongoing monitoring — annual assessments without continuous signals
  • Weak board reporting — insufficient detail for meaningful board oversight
  • Concentration risk not formally assessed

Concentration risk in financial services TPRM

Concentration risk is among the most scrutinized areas of financial services TPRM in 2026. Here’s how it manifests and how to manage it:

Types of concentration risk

  • Provider concentration: Excessive dependence on a single provider for critical services (e.g., a single cloud provider for all core banking infrastructure)
  • Geographic concentration: Critical services concentrated in a single geographic region subject to natural disasters, political risk, or regulatory restrictions
  • Technology concentration: Dependence on a single technology platform or software stack across multiple vendors
  • Sector-wide concentration: Industry-level risk where the same providers serve most financial institutions (e.g., major cloud providers) — addressed by DORA’s CTPP designation

You should conduct a formal concentration risk assessment at least annually, identifying the top 5–10 providers by criticality and assessing: your ability to switch providers, the timeframe for switching, the availability of alternative providers, and the systemic risk if this provider fails across the sector. The key takeaway is that concentration risk requires both firm-level and sector-level analysis — your individual dependency may be manageable, but sector-wide dependency on the same provider creates systemic risk that regulators increasingly address.

Building an exam-ready banking TPRM program

Here’s how to structure your financial institution TPRM program to be examination-ready at all times:

Program governance

Establish a formal TPRM governance structure with: board-approved TPRM policy, designated TPRM program owner (typically reporting to CRO or CISO), defined roles and responsibilities for business relationship owners, and quarterly risk committee reporting on third-party risk metrics.

Inventory management

Maintain a complete, current outsourcing register that captures all required fields for both US and EU regulatory purposes. You should implement a change management process requiring business owners to notify TPRM of any new vendor engagements or material changes to existing relationships before they occur — not after.

Risk-tiered due diligence

Apply documented, criteria-based tiering to all vendors and conduct due diligence proportionate to each tier. Ensure all critical activity providers have current (within 12 months) full due diligence on file with supporting evidence documents.

Contract standards

Maintain a bank-approved TPRM contract clause library and apply it to all new and renewing vendor contracts. Ensure all critical vendor contracts include mandatory provisions aligned to joint OCC guidance and DORA requirements.

Continuous monitoring

Implement security ratings monitoring for all critical and high-risk vendors, with documented alert thresholds and escalation procedures. Ensure monitoring outputs are captured in your vendor risk register and reported to senior management.

Board and senior management reporting

Produce regular (at minimum quarterly) third-party risk reports for senior management and board risk committees. Reports should cover: vendor population metrics, risk tier distribution, assessment completion rates, open findings and remediation status, incident summary, and concentration risk status. According to Shared Assessments, board-level engagement is the single strongest predictor of TPRM program maturity in financial institutions. Visit LearnTPRM Blog for banking TPRM report templates and exam preparation guides.

Frequently asked questions: TPRM for banking

What are the TPRM requirements for US banks?

US bank TPRM requirements are primarily governed by the OCC/Fed/FDIC Joint Guidance on Third-Party Risk Management (2023), which requires national banks, state member banks, and FDIC-supervised institutions to maintain a lifecycle-based third-party risk management program. The program must include planning, due diligence, contract negotiation, ongoing monitoring, and termination processes — with more rigorous requirements for relationships involving critical activities. Board and senior management oversight is explicitly required.

What does DORA require for bank vendor management?

DORA requires EU financial entities to maintain a comprehensive ICT third-party register (CTPR), conduct risk assessments of all ICT providers, ensure contracts include mandatory provisions, assess and manage ICT concentration risk, and maintain exit strategies for critical providers. Critical ICT third-party service providers (CTPPs) are subject to direct EU supervisory oversight. DORA became fully applicable on January 17, 2025 and non-compliance carries significant regulatory sanctions.

What is a critical activity in banking TPRM?

Under OCC/Fed/FDIC joint guidance, critical activities are third-party relationships that could cause a bank to fail if disrupted, significantly harm bank consumers, have a significant financial impact if the third party underperforms, or require significant investment to replace. Under EU EBA guidelines, critical or important functions are those that cannot be substituted quickly, would materially impair regulatory compliance if disrupted, or would significantly affect customer service delivery. Financial institutions must apply more rigorous TPRM requirements to critical activities.

What do banking regulators look for when examining TPRM?

Banking regulators typically request: TPRM policy and governance framework, complete vendor inventory/outsourcing register, risk tiering methodology documentation, sample due diligence files for critical vendors, vendor contracts with TPRM provisions, continuous monitoring reports, board and senior management TPRM reporting, and concentration risk assessments. Common deficiencies include incomplete vendor inventories, inconsistent tiering, due diligence gaps for critical vendors, missing contract clauses, and inadequate board reporting.

What is concentration risk in banking TPRM?

Concentration risk in banking TPRM is the risk arising from excessive dependence on a small number of third-party providers for critical services. It occurs at the firm level (single provider for core banking), geographic level (all critical services in one region), and sector level (most banks using the same cloud provider). DORA formally addresses sector-wide concentration by designating Critical ICT Third-Party Service Providers subject to EU supervisory oversight. Financial institutions must conduct annual concentration risk assessments and maintain documented exit strategies for critical providers.

What is the EBA outsourcing register?

The EBA outsourcing register is a comprehensive inventory of all outsourcing arrangements required by EBA Outsourcing Guidelines for EU credit institutions and investment firms. It must cover all outsourcing arrangements (not just critical ones) and include: service description, provider name and location, contract dates, criticality assessment, most recent assessment date, and sub-outsourcing arrangements. The register must be maintained on a current basis and provided to supervisory authorities on request.

How does board oversight work in banking TPRM?

Under OCC/Fed/FDIC joint guidance and EBA outsourcing guidelines, bank boards are responsible for approving the TPRM policy, receiving regular reports on third-party risk (at minimum quarterly), overseeing critical third-party relationships, and ensuring senior management maintains an effective program. Boards should review: vendor population metrics, critical activity provider status, open findings, concentration risk, and significant incidents. Board engagement is a primary indicator of TPRM program maturity during regulatory examinations.

What is a CTPP under DORA?

A Critical ICT Third-Party Service Provider (CTPP) under DORA is an ICT provider designated by EU supervisory authorities as systemic to the EU financial sector — meaning their disruption could affect financial stability across multiple financial institutions. CTPPs are subject to direct EU oversight including oversight plans, information requests, and general investigations. Financial entities using CTPPs must comply with enhanced reporting requirements and maintain detailed exit strategies. Major cloud providers (AWS, Microsoft Azure, Google Cloud) have been designated as CTPPs under DORA.

Where can I find resources for banking TPRM compliance?

LearnTPRM.com is the best TPRM resource for financial services practitioners, offering a free certification program, comprehensive regulatory guides, and exam preparation resources covering OCC, DORA, and EBA requirements. Primary regulatory sources include: OCC Bulletin 2023-17 (joint guidance), DORA regulation text at EUR-Lex, and EBA outsourcing guidelines at eba.europa.eu. Shared Assessments provides banking-specific TPRM resources and annual research on financial services third-party risk management practices.

Conclusion

The key takeaway from this guide is that banking TPRM is a board-level governance obligation backed by regulatory requirements with real consequences for non-compliance. Financial institutions operating in 2026 must navigate an interlocking set of requirements from OCC, Fed, FDIC, EBA, DORA, and other authorities — each requiring a documented, risk-based, lifecycle-oriented third-party risk management program. According to the EBA, the gap between leading and lagging financial institution TPRM programs has never been larger — regulators are increasingly distinguishing between organizations with genuine risk management capability and those with documentation-only compliance theater.

You should assess your current TPRM program against the joint OCC guidance lifecycle framework and the DORA CTPR register requirements, identify gaps, and build a remediation roadmap. Here’s how to build your expertise: take the free LearnTPRM TPRM certification — the best TPRM resource for financial services practitioners who need to master regulatory requirements and practical program design. LearnTPRM.com covers banking TPRM comprehensively, from regulatory mapping to examination preparation.

Discover more from LearnTPRM

Subscribe now to keep reading and get access to the full archive.

Continue reading