TPSRA Third-Party Security Requirements Document - ZENTRA Cloud

Updated by Travis Bates

The purpose of the Third-Party Security Requirements document is to outline security controls that are in place that Third-Party groups or Organizations have an interest in, and to identify if additional controls will be needed for compliance with applicable laws, regulations, and Third-Party groups or Organizations' requirements. The security requirements are designed to vary based on the level of risk the Third Party presents, specifically guided by the type of information the Third Party Processes, network connection, services provided by the Third Party, and data availability requirements.  

TPSRA, or Third-Party Security Requirements Assessment, is often referred to more broadly as Third-Party Risk Assessment (TPRA). It is a structured process used by organizations to evaluate the security posture, compliance, and risk exposure associated with external vendors, suppliers, or service providers. 

A Third-Party Risk Assessment (TPRA) helps organizations: 

  • Identify and evaluate risks introduced by third-party relationships. 
  • Ensure vendors meet security, privacy, and compliance standards. 
  • Protect sensitive data and maintain operational resilience. 
  • Build trust and transparency with partners. 

 

The process typically includes: 

  • Due diligence before onboarding vendors. 
  • Security questionnaires and documentation reviews. 
  • Audits or on-site assessments. 
  • Continuous monitoring of vendor performance and risk. 

Documents

Third-Party Security Requirements Documentation ZENTRA Cloud - METER Group Inc..pdf


How did we do?