Traditional supply chain security relies on Third Party Risk Management (TPRM) processes, including questionnaires, periodic assessments, and risk scoring. Active Supply Chain Security (ASCS) moves beyond traditional TPRM's static, siloed, compliance-focused approach to deliver standardised assessments, continuous network visibility, proactive threat management, and collaborative defence across the entire supply chain ecosystem.
Active Supply Chain Security delivers systemic risk reduction and enhances resilience across your whole software supply chain by providing:
Yes - Active Supply Chain Security builds resilience against AI-powered attacks in your supply chain. ASCS provides AI governance controls as part of the standardised supplier assessment framework (see Risk Ledger’s AI domains here). ASCS also gives you continuous visibility over nth party vulnerabilities, enables intelligence sharing with ecosystem partners and provides real-time insights to help you limit the cascading impacts of AI-powered breaches.
The best active supply chain security systems include these four key features in one centralised platform:
Yes - traditional third-party risk management (TPRM) is not designed for today’s interconnected supply chains. TPRM was created for a simpler world where suppliers were treated as isolated entities, risk was assessed periodically, and compliance was the primary objective.
ASCS is built for today’s interconnected reality. Its unified network-first approach reveals hidden concentration risks, provides nth-party visibility, and enables collaborative defence across your entire supply chain - because in modern supply chain security, every link matters.
Yes - ASCS enables you to see supply chains as they truly exist. With thousands of organisations mapped on a living network, you get a full picture of your nth tier connections at a glance and can uncover hidden dependencies deep in your supply chain, track changing supplier relationships, identify concentration risks and spot emerging threats in real-time.
TPRM software was built for a simpler world. Its static approach, limited visibility, and lack of collaboration are not just operational gaps, but fundamental flaws. In particular:
Yes - the new Active Supply Chain Security framework has four key pillars.
By standardising supplier data, connecting thousands of organisations onto a living network, and overlaying proactive threat intelligence, Risk Ledger’s four-stage approach is transforming fragmented TPRM into ASCS. Risk Ledger’s ASCS platform provides:
The result? With Risk Ledger, you can Defend-as-One.
Active Supply Chain Security (ASCS) is not a third-party risk management (TPRM) upgrade, but a fundamentally different approach to supply chain security. While ASCS uses a TPRM engine as its base, an ASCS-optimised platform is needed to provide:
One weak link in the supply chain can bring downstream production to a grinding halt. For example, the 2025 Jaguar Land Rover breach stopped production for five weeks, affecting 5000 businesses across the supply chain. ASCS prevents costly operational downtime by enhancing protection for every link in the supply chain with real-time detection of emerging threats, proactive threat management and rapid incident response across the network.
Each of the four pillars of ASCS minimises wasted effort and maximises supply chain resilience, delivering key benefits to security leaders, security analysts and suppliers.
As ASCS relies on organisations and suppliers proactively working together, the main risk of ASCS is low supplier adoption and engagement. At Risk Ledger, we encourage supplier adoption with free value: free supplier profile to share, free scanning data and free access to an extensive knowledge base to learn about security controls. We’re also constantly improving the supplier experience - from onboarding to use - and offer tailored advice to supplier teams to boost engagement. That’s why 15,000+ suppliers actively use the platform (as of March 2026).
ASCS builds resilience across the entire supply chain by improving third party risk data and intelligence sharing within the ecosystem.
Standardised assessment frameworks aligned to regulations create a common language of risk and provide audit-ready evidence for boards and regulators. Continuous updates to security profiles and network monitoring provides real-time intelligence on supply chain risks. Proactive threat detection and seamless supplier collaboration enables you to remediate vulnerabilities early and share information on security incidents, alerts and risks.
Today’s corporate supply chains are no longer simple lists of vendors — they’re sprawling, complex, interconnected webs that have become the biggest attack surface in cybersecurity (85% of UK cyber security professionals experienced a supply chain cyber security incident in 2025). Modern supply chain attackers target obscure nth-parties and the disruptions cascade through the supplier ecosystem. E.g. The Log4j cyber incident cascaded through 60% of corporate networks with 800,000 attacks in 72 hours.
ASCS reduces third party risk by transforming TPRM from a siloed, reactive function into a proactive cyber defence discipline. The four key pillars of ASCS reduce third party risk:
Yes - ASCS’s standardised assessment framework includes controls on AI governance, so organisations can ensure their third party suppliers have resilient AI security postures. For example, Risk Ledger’ ASCS-focused platform includes 15 AI domain controls, which check if suppliers’ use of AI data, models and services.
Security reviews no longer kill your deal momentum, but help you close faster. Instead of answering the same security questions for every client, suppliers complete one profile and share it with all customers.
With ASCS, you'll also foster greater trust and collaboration with your clients. Combine your assessment outcomes from multiple clients, learn where your vulnerabilities lie and proactively work with clients to remediate them, demonstrating security leadership and building trust along the way.
Yes - ASCS is the only supply chain security approach that delivers continuous visibility, proactive threat management, and collaborative defence across the entire supply chain ecosystem. Instead of compliance box-ticking, security leaders and risk management teams need ASCS to proactively reduce third-party risk, protect their ecosystem and strengthen industry-wide resilience.
Most supply chain security vendors offer platforms based on outdated third-party risk management (TPRM) processes. Risk Ledger’s platform is optimised for Active Supply Chain Security (ASCS). By standardising supplier data, connecting thousands of organisations onto a living network, and overlaying proactive threat intelligence, Risk Ledger’s four-stage approach delivers:
That’s how Risk Ledger enhances supply chain security for 16,000+ organisations.
Yes - Risk Ledger maps supply chain dependencies as they truly exist, uncovering hidden nth-party relationships and pinpointing concentration risks. With full visibility of your changing nth tier connections, you can proactively take action to avoid cascading failures before they happen.
Risk Ledger maps thousands of organisations on one ever-growing network. This gives you the full picture of your nth tier connections and a bird's-eye view of your entire network’s concentration risks. For instance, Schroders Personal Wealth achieved 95% visibility of its 200-strong supplier network with Risk Ledger.
Delivering true Active Supply Chain Security (ASCS) involves four key stages:
Each pillar of Active Supply Chain Security (ASCS) limits the cyber risk of onboarding new vendors and working with existing vendors.
Collective defence → Vendors and organisations proactively addressing threats together as a community.
No - traditional third-party risk management (TPRM) relies on periodic, point-in-time assessments, which leaves your organisation blind to changes in supplier’s risk profiles, so you only discover a weakness after it has been exploited.
Only Active Supply Chain Security (ASCS) provides live network visibility, continuous monitoring and real-time alerts of emerging threats, enabling proactive threat management across the supply chain ecosystem.
Instead of completing unique questionnaires for every client, suppliers create one standardised profile and share it across the entire network. As a supplier, you should also:
The more suppliers on the network, the more secure the supply chain. With ASCS, suppliers complete, maintain and share one security profile, so the whole supply chain benefits from knowing their up-to-date security posture. These profiles are also aligned to regulations, improving industry-wide compliance.
In addition, suppliers should follow ASCS best practices, including:
The very act of joining an ASCS platform, creating a profile and collaborating with other organisations in the network helps to reduce third party risk. But suppliers can also follow best practices to enhance network-wide security and give a clearer picture of the entire supply chain, including:
First, get started with a free ASCS platform, such as Risk Ledger.
With Risk Ledger, you get started in just three steps:
You then create one security profile and share it with all your existing partners on the platform.
The Risk Ledger assessment gives your clients assurance that your organisation maintains an appropriate level of risk controls in order to protect both yourself, and them, from cyber incidents.
You have been asked to complete an assessment by your client because third-party risk management is:
You can read more about the importance of managing supply chain security risks in this article from the National Cyber Security Centre (NCSC).
No, Risk Ledger is free and always will be free for suppliers to join and use the platform to showcase their security regime to clients.
Ensuring the security of our platform and its users is central to what we do at Risk Ledger. We maintain strict security and confidentiality controls to ensure that your information remains secure. You can review Risk Ledger's security assessment yourself using the platform! Just request access by emailing support@riskledger.com.
Privacy:
The only data visible to organisations you are not connected with is your company’s name and the country it is registered in to allow connection requests to be sent and accepted.
Security:
For further information on our security and privacy policy please visit the below pages:
Your Risk Ledger assessment is only visible to the organisations you chose to share it with - nobody else. You are in complete control of your profile and data on Risk Ledger.
Organisations on Risk Ledger can request access to your assessment by sending you a connection request on the platform. They will only gain visibility of your assessment if and when an authorised user on your account has accepted the request.
The only data visible to other organisations you are not connected with is your company’s name and the country it is registered in to allow connection requests to be sent and accepted.
We have very strict confidentiality and data protection in place at Risk Ledger. Visit the links below for more information on this:
Yes, once you have completed your supplier assessment, you can take advantage of the free tools we have designed to ensure your Risk Ledger assessment is the last one you ever have to complete.
You can share access to your Risk Ledger assessment at the click of a button with any other client who requires you to complete a security risk assessment so you can avoid manual spreadsheets and long email conversations about the assessment.
There are two ways in which you can share your Risk Ledger assessment, even if your client isn't a Risk Ledger user themselves:


You can also provide a client contact's email address and the platform will send them the new link directly. Only your assessment answers and notes are shared with the link, but not any evidence.
To access your evidence, the client can sign up to Risk Ledger for free and connect with you through the platform.
A link expires in 1 month, but can be invalidated earlier if needed by clicking the bin icon.
If your client stops using Risk Ledger or they delete the connection between your organisation and their organisation on the platform, you will no longer have an active connection with them on Risk Ledger. You can see and manage client connections while signed in to your Risk Ledger account in the "Clients" list.
Once a connection is no longer active, we keep an audit log for your client of your Risk Ledger assessment as it was at the point of deletion. This is to allow an audit trail of your client's third-party risk management activities to be maintained.
Only authorised users in your organisation manage your Risk Ledger account and data so your profile on the platform will exist unless you delete your account. As long as your organisation has an account, you can share access to your Risk Ledger assessment for the clients you choose - nobody else.
If a supplier deletes their account, all personal data is removed from Risk Ledger, and clients who were connected with that supplier have visibility of their supplier assessment as it was at the point of deletion for the purpose of an audit trail.
When you are no longer a supplier to a client you or your client can delete your connection on Risk Ledger - just click the "Remove Client" button on the client overview page. Removing a client connection will have no impact on your connection with any other client who you are connected with on Risk Ledger.
Once a connection is deleted, your supplier profile will no longer be visible to that client. We do keep an audit log available for the client of the Risk Ledger assessment as it was at the point of deletion to ensure there is an audit trail.
Clients will invite their main point of contact at your organisation, which tends to be a commercial contact. Once signed up, you are able to add an unlimited number of users to collaborate on completing the assessment. The first person to sign up on behalf of your organisation and users with 'admin' status can invite all relevant colleagues to complete sections of the assessment relevant to their role and expertise. This usually includes colleagues from the information/cyber security, IT and information governance teams.

You can see the full list of controls and domains covered in the Risk Ledger assessment here to guide you on who may need to be added as a user from your organisation to collaborate on the assessment.
We have designed the Risk Ledger platform to make it easier and faster to respond to client security due diligence and assurance assessments.
By allowing suppliers to create and manage an account on the platform, Risk Ledger gives you a user friendly way to complete, evidence and maintain a comprehensive security assessment once and then easily share it with any other client who requests information about your security programme - eliminating the need to repeat this task for every client. Read more about how Risk Ledger works for suppliers here.
Once your assessment is completed, the Risk Ledger platform facilitates easy private communication between you and your client(s) about your assessment, eliminating long and confusing email trails while keeping you up to date with the status of your assessment with each client you are connected with on the platform.
As a security focused business, it is really important to us that your organisation and personal details are kept secure when you use the Risk Ledger platform. Multi-factor authentication (MFA) is one of the best ways to do this for any user account. You can read a bit more about why this is important in this article by the National Cyber Security Centre.
Switch to an Authenticator app:
If you prefer not to use a mobile number once signed up, you are able to go to your account "Settings" > "My Account" > "Configure 2FA" and connect your chosen authenticator app to the account. See this article for a list of Authenticator apps.

Product Level Answers (PLA) empowers suppliers to accurately represent their varying security controls across multiple products and services within a single organisational profile. Allowing suppliers who have different security implementations across their product portfolio.
The result is more efficient security information sharing, reduced questionnaire fatigue, and the ability to demonstrate security controls precisely where they matter, ultimately leading to faster sales cycles and improved client relationships.
Suppliers can use one login in:
Yes, you can quickly add users to your account. To add users you will just need the email address of the colleague you would like to add.
To add a user navigate to your account Settings > Users > Add Users

Avoid adding users via shared or group email accounts.
You can provide access to the platform for multiple users by adding each one using a direct email address.
The assessment autosaves so multiple users can collaborate on the assessment at the same time without losing any progress.
The assessment is not in a pass/fail format and your answers will be compared with your clients' security policies . This allows you and your clients to have greater visibility of any gaps and to work collaboratively to remediate them.
Additionally, if you do answer 'No' to a question, you are able to add context to this answer in the notes section.
If one of your clients do require remediation of a security control, they can request this through the platform and you will be notified.

Yes, Risk Ledger allows you to switch between a Supplier and a Client view, meaning that you can switch between sharing your own assessment and running assurance on your own Suppliers. Get in touch with the team to find out more!
Our framework is based off key industry standards and regulations, including NIS, ISO 27001, and GDPR. It is reviewed and updated every six months to ensure alignment with the latest regulatory requirements.
Risk Ledger is trusted by companies worldwide to manage their vendors, leveraging a unique social network model that simplifies scaling vendor security while providing unparalleled visibility into the supply chain to quickly identify and address potential vulnerabilities.
Risk Ledger ensures the security of your data through advanced protections embedded into its platform. Organisations can securely share their Security Profile with clients via encrypted links, which are designed to expire automatically after 30 days or can be manually deactivated for added control. Additionally, the platform is built to maintain strict privacy and compliance standards, enabling organisations to confidently centralise and share their security controls without compromising sensitive information.
Risk Ledger supports finance companies by helping ensure regulatory compliance with frameworks like DORA and ISO standards, streamlining the assessment of vendor security. The platform centralises and tracks suppliers' cybersecurity measures, helping to mitigate third-party risks and data breaches. It also provides clear visibility into supplier risk management, aiding informed decision-making. Additionally, Risk Ledger enables operational resilience through continuous monitoring and updates, allowing firms to react quickly to emerging supply chain risks.
Risk Ledger enables technology businesses to streamline vendor risk management, enhance supply chain visibility, and respond swiftly to vulnerabilities. Companies leverage both the client and vendor sides of the platform to share security information, build trust with clients, win business, and manage risks within the technology sector.
Yes, Risk Ledger is compliant with regulatory standards for Critical National Infrastructure (CNI) sectors. The platform is designed to help organisations in regulated industries, such as finance and infrastructure, meet compliance requirements by providing visibility into supplier risk, managing security controls, and offering continuous monitoring for emerging threats.
Risk Ledger helps financial services and insurance companies manage supply chain risks with features like real-time risk scoring, supplier communication, and continuous monitoring for emerging threats. The platform enables regulatory compliance tracking, reduces vendor onboarding time, and provides visibility into concentration risks across the supply chain.
Yes, Risk Ledger can assist with compliance audits for critical infrastructure by centralising security data and providing visibility into the compliance status of suppliers. The platform tracks key regulatory frameworks, such as NIS2 and ISO standards, and helps identify gaps, streamlining the audit process. It also facilitates quick access to supplier security histories and ensures that organisations meet regulatory requirements, making the audit process more efficient and transparent.
Risk Ledger mitigates supply chain security risks in the CNI sectors by providing a centralised platform for continuous monitoring and assessment of vendor security. It helps identify vulnerabilities early, reducing the impact of cyberattacks such as ransomware. The platform ensures compliance with relevant cybersecurity standards, enabling organisations to manage third-party risks effectively. Additionally, Risk Ledger supports proactive risk management by facilitating communication with suppliers and enabling rapid responses to emerging threats.
Suppliers, as a minimum, update their profile at least every 6 months and this is automated through the platform meaning at the very least you are receiving updates at least twice as much vs a manual method with zero effort on your side. Typically suppliers update their profile more often than this as they are connected with more than one customer, therefore updating their profile as they go through further reviews. Any update is communicated to you and any other client they are connected with. You are able to track any changes in the suppliers profiles in the activity tab and we send a weekly update on any change in any supplier profile. This also massively reduces the burden on re-reviews as you are constantly looking at accurate up to date information.
Yes it is a self assessment, it is an industry norm that self assessments are sufficient for supplier reviews as scanning tools cannot give us a view on internal security controls and onsite audits are over burdensome on both client and supplier resources meaning it is unfeasible to cover all vendors and impossible to continually monitor. Traditionally manual approaches also rely on self assessments but crucially are point in time assessments and are therefore out of date the moment you receive them. Taking the above into account, it therefore matters what the self assessment covers. That is why Risk Ledger has built our best in class Supplier Assessment Framework (mapping to ISO 27001, Nist800, NCSC CAF) focused on allowing the suppliers to demonstrate their specific security controls and evidence to support the client in understanding whether the supplier is appropriately complying with regulations and best practices. Risk Ledger then goes further with our unique network based approach then allowing clients to continually monitor those controls and giving visibility into 4th/5th/6th parties that is virtually impossible to achieve via any other method.
Yes, the suppliers need to be on the platform to assess 3rd parties and beyond which is why growing the network is a priority. We have onboarded over 1200 vendors from January - June 2023 alone, as a result, security professionals on Risk Ledger are constantly receiving insights beyond the 3rd party that they cannot receive via any other method. Recently, a high street bank, using Risk Ledger onboarded 14 suppliers in 2 days and immediately had visibility down to their 7th party and identified 7 previously unidentified concentration risks.
Yes, you can use our network visibility tool to demonstrate this to regulators very easily
Yes, our framework and approach is approved by UK government experts, you can learn more about how we help the public sector here.
Yes we do, you can learn more about our security standards on our security page
Our framework is agnostic and covers ISO, NIST, SOC2, GDPR & ESG to name a few
We rely on the power of the network to ensure that the data is accurate. Supplier profiles are being reviewed by multiple clients. Reviewing the data constantly helps ensure that it’s of a higher quality.
You set the thresholds of what is expected of your suppliers based on criticality or the data that they store. Alternatively, you can customize this as you see fit through bespoke policies
Risk Ledger gives you instant access to up-to-date information on all of your suppliers, go into the reporting tab and export the reports necessary to demonstrate your third-party risk processes.
You can get as specific as you need with our reporting functionality. You can show a holistic overview of your supply chain ecosystem, or access a more granular view of it and report on specific risk registers
We have a public API that you can use to connect to some GRC tools, however, it’s worth speaking to a member of the Risk Ledger team about your specific use case.
You can learn about what qualifies as an emerging threat here: https://riskledger.com/resources/increasing-response-security-threats.
Normally we publish one within 1 day of it becoming a major issue.
You can message your suppliers about potential security issues, however, we take responsibility for publishing a network wide threat.
You can use the discussion feature for any bespoke or follow-up questions for your suppliers. If you notice that a certain area or domain is not covered or needs more detail please let us know and we can look into expanding in the next update.
We take security really seriously - any supplier that joins Risk Ledger has the opportunity to review us. We have strict data protection policies that everyone has to follow, sign terms and conditions which govern a two way relationship between us and the supplier.
We are a data pipe that sits between client and supplier, it's not up to us to decide what's good enough for you, however, the fact that supplier profiles are being reviewed by multiple clients means that the data is of a higher standard than most platforms. We can provide a fully managed service through one of our partners if required.
Our framework is reviewed every 6 months. Our team looks at incoming regulations/industry trends and adjusts the framework accordingly. However, we see the framework as a collaborative effort and encourage the Risk Ledger community to suggest amendments. This 2 pronged approach is what ensures that our framework is up to date and is as robust as possible.
Risk Ledgers standardised framework is built to address a range of regulations so you shouldn’t need to add any questions. However, we review our framework every 6 months so if there are gaps please let us know and we can look into them.
Most likely yes! Our framework has been built with all the major certifications & assessment frameworks in mind. In addition, we are constantly reviewing it to ensure it’s up to date. If you want to check about a specific certification or framework please get in touch.
Ensuring the security of our platform and its users is central to what we do at Risk Ledger. We maintain strict security and confidentiality controls to ensure that your information remains secure. You can review Risk Ledger's security assessment yourself using the platform! Just request access by emailing support@riskledger.com.
Privacy:
The only data visible to organisations you are not connected with is your company’s name and the country it is registered in to allow connection requests to be sent and accepted.
Security:
For further information on our security and privacy policy please visit the below pages:
Over 60% of organisations have experienced a security breach caused by a third party and managing this risk has become mission critical to organisations in every industry.
Running a third-party risk management (TPRM) programme allows you to identify and understand the risks in your supply chain. Risk Ledger gives you access to real-time information directly from your suppliers in order to help you mitigate these risks and perform continuous due diligence on your suppliers.
Running a third-party risk management programme may be required by your clients or be a regulatory requirement in your industry. E.g. the NIS directive in the EU.
Risk Ledger provides the tools you need to run a comprehensive, security-led, third-party risk management programme against your entire supply chain.
The Risk Ledger platform is the only solution that moves away from point-in-time assessments and provides you with real-time, actionable data collected directly from suppliers - allowing you to continuously identify, measure and actively manage a comprehensive set of third-party risks at scale and for a low, per-supplier cost.
Our unique network model gives you visibility of supply chain risks beyond third parties to fourth, fifth and sixth parties too.
Using Risk Ledger helps you to increase supplier engagement with your third-party risk management programme by making it simple, free and fast for them to engage, respond and improve.
We have a tiered pricing model depending on the benefits you want to take advantage of and the size of your supply chain. For full information on our pricing please contact us.
Risk Ledger is free for suppliers, so when you invite an organisation to review they will not need to pay to respond or engage with you in any way.
Yes. It is not a problem if your suppliers are not already on the platform. On average it takes 10 business days from the time a supplier is invited to having a completed profile - much quicker than a manual process.
You can simply invite your suppliers to the platform using an email address, either individually or in bulk, and we will support the supplier(s) to onboard.

The number of suppliers maintaining a completed assessment on the platform is growing at an exponential rate so you will be able to connect with and review a good proportion of your third parties almost instantaneously.
As a security focused business, it is really important to us that your organisation and personal details are kept secure when you use the Risk Ledger platform. Multi-factor authentication (MFA) is one of the best ways to do this for any user account. You can read a bit more about why this is important in this article by the National Cyber Security Centre.
Switch to an Authenticator app:
If you prefer not to use a mobile number once signed up, you are able to go to your account "Settings" > "My Account" > "Configure 2FA" and connect your chosen authenticator app to the account. See this article for a list of Authenticator apps.
