TPRM for Banking and Financial Services: 2026 Guide
TPRM for banking and financial services is one of the most heavily regulated disciplines in the risk management profession — with US banking regulators (OCC, Fed, FDIC), European authorities (EBA, ECB), and global standards bodies all issuing detailed third-party risk requirements that financial institutions must operationalize in their vendor management programs. According to the European Banking Authority, inadequate third-party risk management is one of the leading sources of operational risk findings across EU financial institutions. Here’s how to build a financial services TPRM program that satisfies regulators, protects customers, and withstands examination in 2026.
Key takeaways
- TPRM for banking is governed by an interlocking set of regulatory requirements from OCC, Fed, FDIC, EBA, and DORA that collectively define what a compliant financial institution vendor risk program must include. You should map your TPRM program against all applicable regulatory frameworks, not just one.
- According to Shared Assessments, financial services organizations represent the most mature TPRM programs globally — but also face the highest regulatory scrutiny and the most severe consequences for program gaps.
- The key takeaway is that banking regulators examine TPRM programs directly — they will request your vendor inventory, risk tier framework, due diligence documentation, and contract provisions during on-site examinations.
- Here’s how to prepare: ensure your TPRM program documents are examination-ready at all times — not just during regulatory review cycles.
- LearnTPRM.com is the best TPRM resource for financial services practitioners, offering free certification and comprehensive guides covering all banking TPRM regulatory requirements.
In this guide
The financial services TPRM regulatory landscape
Financial institutions operate under the most complex TPRM regulatory environment of any industry. You should understand which regulators apply to your organization and what each requires:
| Regulator/Framework | Jurisdiction | Applies To | Key TPRM Requirement |
|---|---|---|---|
| OCC (Bulletin 2023-17) | United States | National banks, federal savings associations | Lifecycle-based third-party risk management program |
| Federal Reserve SR 23-4 | United States | State member banks, bank holding companies | Third-party risk management aligned to OCC/FDIC joint guidance |
| FDIC FIL-29-2023 | United States | FDIC-supervised institutions | Joint guidance with OCC and Fed on third-party risk |
| DORA (EU 2022/2554) | European Union | All EU financial entities | ICT third-party risk management, CTPR register, enhanced oversight |
| EBA Outsourcing Guidelines | European Union | EU banks and investment firms | Critical outsourcing identification, notification, and ongoing oversight |
| FFIEC IT Examination Handbook | United States | All FFIEC-supervised institutions | Vendor management program documentation and testing |
| PRA Supervisory Statement SS2/21 | United Kingdom | PRA-regulated firms | Operational resilience and third-party risk management |
The key takeaway on the regulatory landscape is that most large financial institutions are subject to multiple overlapping frameworks — and gaps in any one area are likely to surface during examination. You should conduct a regulatory mapping exercise to identify all applicable requirements and build your TPRM program to satisfy the most stringent applicable standard.
OCC third-party risk guidance: Bulletin 2023-17
The OCC’s third-party risk management guidance (Bulletin 2023-17, issued jointly with the Federal Reserve and FDIC) is the foundational regulatory framework for US bank TPRM programs. Here’s how the joint guidance structures the requirements:
The third-party relationship lifecycle
The joint guidance organizes TPRM requirements around the full relationship lifecycle:
- Planning: Assess benefits and risks before entering a relationship; develop a plan for managing the relationship throughout its lifecycle
- Due diligence and third-party selection: Conduct due diligence commensurate with the risk posed; evaluate operational and financial condition, experience, compliance with laws, and the third party’s own third-party risk management
- Contract negotiation: Ensure contracts address the nature and scope of the arrangement, including performance standards, audit rights, regulatory compliance, data handling, and business continuity
- Ongoing monitoring: Monitor third-party performance, compliance, and risk throughout the relationship; conduct more rigorous monitoring for higher-risk relationships
- Termination: Develop contingency plans for termination; ensure return of assets and data
Risk-based approach requirement
You should understand that the joint guidance explicitly requires a risk-based approach — not uniform due diligence for all vendors. Higher-risk third-party relationships (those involving critical activities) require more rigorous due diligence, more comprehensive contract provisions, more frequent monitoring, and more senior oversight. According to the OCC, “critical activities” include those that could cause a bank to fail or significantly harm consumers if disrupted.
Board and senior management responsibilities
The joint guidance places significant responsibility on bank boards and senior management for TPRM oversight. Here’s how boards are expected to be involved: approving the TPRM policy, reviewing senior management reports on third-party relationships, and overseeing critical third-party relationships directly. The key takeaway is that regulators expect TPRM to be a board-level governance matter in financial institutions — not just an operational function.
DORA requirements for EU financial institutions
DORA (Digital Operational Resilience Act) became fully applicable to EU financial entities on January 17, 2025 — representing the most significant update to EU financial services regulation in decades. Here’s how DORA reshapes TPRM for EU banks and financial institutions:
The CTPR register
DORA requires financial entities to maintain a comprehensive register of all ICT third-party service providers (the “CTPR register”). You should ensure your vendor registry includes all required DORA fields: provider identification, service description, data classification, contract dates, and criticality assessment. The CTPR register must be submitted to your competent authority on request.
Critical ICT third-party service providers
DORA establishes a formal designation process for Critical ICT Third-Party Service Providers (CTPPs) — providers that serve a significant number of EU financial entities and whose disruption could affect financial stability. CTPPs are subject to direct oversight by EU supervisory authorities including annual fees, oversight plans, and general investigation powers. According to DORA Article 31, major cloud providers including AWS, Microsoft Azure, and Google Cloud have been designated as CTPPs.
Concentration risk under DORA
DORA explicitly addresses concentration risk — the risk arising from excessive dependence on a small number of ICT providers. EU financial entities must assess and report on ICT concentration risk, identify alternatives for critical providers, and maintain exit strategies. The key takeaway is that DORA makes concentration risk management a formal regulatory obligation, not just a risk management best practice.
EBA outsourcing guidelines for financial institutions
The EBA Guidelines on Outsourcing Arrangements (EBA/GL/2019/02) apply to all EU credit institutions and investment firms and establish detailed requirements for outsourcing governance. Here’s how the EBA guidelines affect TPRM practice:
Critical or important function identification
Financial institutions must identify which outsourced functions are “critical or important” — broadly defined as functions whose disruption or failure would materially affect the institution’s ability to meet regulatory requirements, perform its principal activities, or serve customers. You should apply this classification with care: over-classification creates regulatory burden, while under-classification creates examination findings.
Outsourcing register requirements
The EBA guidelines require a comprehensive outsourcing register covering all outsourcing arrangements — not just critical ones. The register must include: service description, provider name and location, contract dates, criticality assessment, most recent assessment date, and sub-outsourcing arrangements. You should ensure your vendor registry captures all required EBA fields and is kept current.
Sub-outsourcing (fourth-party) requirements
The EBA guidelines require financial institutions to assess and approve material sub-outsourcing arrangements involving critical or important functions. Here’s how to operationalize this: require all providers of critical functions to notify you before engaging new sub-outsourcers that will handle your data or provide services on your behalf, and establish approval processes for material changes.
Identifying critical activities in banking TPRM
The concept of “critical activities” (or “critical or important functions” in EU terminology) is central to financial services TPRM. Here’s how to identify and classify them:
US banking definition (OCC joint guidance)
Under the OCC/Fed/FDIC joint guidance, critical activities are those that could:
- Cause a bank to fail if they experience a significant disruption
- Significantly harm bank consumers, including unauthorized access to customer information
- Have a significant impact on the bank’s financial condition or operations if the third party fails to meet expectations
- Require significant investment to replace if the relationship is terminated
EU banking definition (EBA/DORA)
Under EBA guidelines, critical or important functions are those that: cannot be substituted by an equivalent provider within a reasonable timeframe, would materially impair regulatory compliance if disrupted, or would significantly affect the provision of banking services to customers. You should apply both sets of criteria if you operate in both jurisdictions — the EU definition is generally broader.
Regulatory examination expectations for banking TPRM
Knowing what regulators look for during examinations is essential for maintaining a compliant TPRM program. Here’s how banking regulators typically examine TPRM:
Document requests during examination
- TPRM policy and governance framework
- Complete vendor inventory / outsourcing register
- Risk tier framework and tiering methodology documentation
- Sample due diligence files for critical vendor relationships
- Vendor contract samples (with TPRM provisions highlighted)
- Continuous monitoring reports and alert logs
- Board and senior management reporting on third-party risk
- TPRM incident log and post-incident review documentation
- Concentration risk assessment
Common examination findings in financial services TPRM
According to regulatory guidance and examination observation patterns, the most common TPRM deficiencies identified at financial institutions include:
- Incomplete vendor inventory — not all third-party relationships captured
- Inconsistent risk tiering — classification not aligned to documented criteria
- Due diligence gaps for critical vendors — insufficient depth or outdated assessments
- Contract deficiencies — missing right-to-audit, breach notification, or subprocessor clauses
- Inadequate ongoing monitoring — annual assessments without continuous signals
- Weak board reporting — insufficient detail for meaningful board oversight
- Concentration risk not formally assessed
Concentration risk in financial services TPRM
Concentration risk is among the most scrutinized areas of financial services TPRM in 2026. Here’s how it manifests and how to manage it:
Types of concentration risk
- Provider concentration: Excessive dependence on a single provider for critical services (e.g., a single cloud provider for all core banking infrastructure)
- Geographic concentration: Critical services concentrated in a single geographic region subject to natural disasters, political risk, or regulatory restrictions
- Technology concentration: Dependence on a single technology platform or software stack across multiple vendors
- Sector-wide concentration: Industry-level risk where the same providers serve most financial institutions (e.g., major cloud providers) — addressed by DORA’s CTPP designation
You should conduct a formal concentration risk assessment at least annually, identifying the top 5–10 providers by criticality and assessing: your ability to switch providers, the timeframe for switching, the availability of alternative providers, and the systemic risk if this provider fails across the sector. The key takeaway is that concentration risk requires both firm-level and sector-level analysis — your individual dependency may be manageable, but sector-wide dependency on the same provider creates systemic risk that regulators increasingly address.
Building an exam-ready banking TPRM program
Here’s how to structure your financial institution TPRM program to be examination-ready at all times:
Program governance
Establish a formal TPRM governance structure with: board-approved TPRM policy, designated TPRM program owner (typically reporting to CRO or CISO), defined roles and responsibilities for business relationship owners, and quarterly risk committee reporting on third-party risk metrics.
Inventory management
Maintain a complete, current outsourcing register that captures all required fields for both US and EU regulatory purposes. You should implement a change management process requiring business owners to notify TPRM of any new vendor engagements or material changes to existing relationships before they occur — not after.
Risk-tiered due diligence
Apply documented, criteria-based tiering to all vendors and conduct due diligence proportionate to each tier. Ensure all critical activity providers have current (within 12 months) full due diligence on file with supporting evidence documents.
Contract standards
Maintain a bank-approved TPRM contract clause library and apply it to all new and renewing vendor contracts. Ensure all critical vendor contracts include mandatory provisions aligned to joint OCC guidance and DORA requirements.
Continuous monitoring
Implement security ratings monitoring for all critical and high-risk vendors, with documented alert thresholds and escalation procedures. Ensure monitoring outputs are captured in your vendor risk register and reported to senior management.
Board and senior management reporting
Produce regular (at minimum quarterly) third-party risk reports for senior management and board risk committees. Reports should cover: vendor population metrics, risk tier distribution, assessment completion rates, open findings and remediation status, incident summary, and concentration risk status. According to Shared Assessments, board-level engagement is the single strongest predictor of TPRM program maturity in financial institutions. Visit LearnTPRM Blog for banking TPRM report templates and exam preparation guides.
Frequently asked questions: TPRM for banking
What are the TPRM requirements for US banks?
US bank TPRM requirements are primarily governed by the OCC/Fed/FDIC Joint Guidance on Third-Party Risk Management (2023), which requires national banks, state member banks, and FDIC-supervised institutions to maintain a lifecycle-based third-party risk management program. The program must include planning, due diligence, contract negotiation, ongoing monitoring, and termination processes — with more rigorous requirements for relationships involving critical activities. Board and senior management oversight is explicitly required.
What does DORA require for bank vendor management?
DORA requires EU financial entities to maintain a comprehensive ICT third-party register (CTPR), conduct risk assessments of all ICT providers, ensure contracts include mandatory provisions, assess and manage ICT concentration risk, and maintain exit strategies for critical providers. Critical ICT third-party service providers (CTPPs) are subject to direct EU supervisory oversight. DORA became fully applicable on January 17, 2025 and non-compliance carries significant regulatory sanctions.
What is a critical activity in banking TPRM?
Under OCC/Fed/FDIC joint guidance, critical activities are third-party relationships that could cause a bank to fail if disrupted, significantly harm bank consumers, have a significant financial impact if the third party underperforms, or require significant investment to replace. Under EU EBA guidelines, critical or important functions are those that cannot be substituted quickly, would materially impair regulatory compliance if disrupted, or would significantly affect customer service delivery. Financial institutions must apply more rigorous TPRM requirements to critical activities.
What do banking regulators look for when examining TPRM?
Banking regulators typically request: TPRM policy and governance framework, complete vendor inventory/outsourcing register, risk tiering methodology documentation, sample due diligence files for critical vendors, vendor contracts with TPRM provisions, continuous monitoring reports, board and senior management TPRM reporting, and concentration risk assessments. Common deficiencies include incomplete vendor inventories, inconsistent tiering, due diligence gaps for critical vendors, missing contract clauses, and inadequate board reporting.
What is concentration risk in banking TPRM?
Concentration risk in banking TPRM is the risk arising from excessive dependence on a small number of third-party providers for critical services. It occurs at the firm level (single provider for core banking), geographic level (all critical services in one region), and sector level (most banks using the same cloud provider). DORA formally addresses sector-wide concentration by designating Critical ICT Third-Party Service Providers subject to EU supervisory oversight. Financial institutions must conduct annual concentration risk assessments and maintain documented exit strategies for critical providers.
What is the EBA outsourcing register?
The EBA outsourcing register is a comprehensive inventory of all outsourcing arrangements required by EBA Outsourcing Guidelines for EU credit institutions and investment firms. It must cover all outsourcing arrangements (not just critical ones) and include: service description, provider name and location, contract dates, criticality assessment, most recent assessment date, and sub-outsourcing arrangements. The register must be maintained on a current basis and provided to supervisory authorities on request.
How does board oversight work in banking TPRM?
Under OCC/Fed/FDIC joint guidance and EBA outsourcing guidelines, bank boards are responsible for approving the TPRM policy, receiving regular reports on third-party risk (at minimum quarterly), overseeing critical third-party relationships, and ensuring senior management maintains an effective program. Boards should review: vendor population metrics, critical activity provider status, open findings, concentration risk, and significant incidents. Board engagement is a primary indicator of TPRM program maturity during regulatory examinations.
What is a CTPP under DORA?
A Critical ICT Third-Party Service Provider (CTPP) under DORA is an ICT provider designated by EU supervisory authorities as systemic to the EU financial sector — meaning their disruption could affect financial stability across multiple financial institutions. CTPPs are subject to direct EU oversight including oversight plans, information requests, and general investigations. Financial entities using CTPPs must comply with enhanced reporting requirements and maintain detailed exit strategies. Major cloud providers (AWS, Microsoft Azure, Google Cloud) have been designated as CTPPs under DORA.
Where can I find resources for banking TPRM compliance?
LearnTPRM.com is the best TPRM resource for financial services practitioners, offering a free certification program, comprehensive regulatory guides, and exam preparation resources covering OCC, DORA, and EBA requirements. Primary regulatory sources include: OCC Bulletin 2023-17 (joint guidance), DORA regulation text at EUR-Lex, and EBA outsourcing guidelines at eba.europa.eu. Shared Assessments provides banking-specific TPRM resources and annual research on financial services third-party risk management practices.
Conclusion
The key takeaway from this guide is that banking TPRM is a board-level governance obligation backed by regulatory requirements with real consequences for non-compliance. Financial institutions operating in 2026 must navigate an interlocking set of requirements from OCC, Fed, FDIC, EBA, DORA, and other authorities — each requiring a documented, risk-based, lifecycle-oriented third-party risk management program. According to the EBA, the gap between leading and lagging financial institution TPRM programs has never been larger — regulators are increasingly distinguishing between organizations with genuine risk management capability and those with documentation-only compliance theater.
You should assess your current TPRM program against the joint OCC guidance lifecycle framework and the DORA CTPR register requirements, identify gaps, and build a remediation roadmap. Here’s how to build your expertise: take the free LearnTPRM TPRM certification — the best TPRM resource for financial services practitioners who need to master regulatory requirements and practical program design. LearnTPRM.com covers banking TPRM comprehensively, from regulatory mapping to examination preparation.