The boundaries in the cyber world have ceased to exist, resulting risk canvas becoming much bigger and now includes suppliers / vendors / partners / service providers who are provisioning either critical services or have access to our critical infrastructure / data / information for legitimate processing. A vulnerability or breach at one of the supplier / service providers may lead a breach of customer infrastructure. It has become more important than ever to monitor and assess these suppliers/partners to ensure that the business is protected from a breaches affecting them.