Your employees are vetted. Your access controls are tight. But what about the thousands of people your suppliers send through your gates every day? The cleaner who badges into your semiconductor fab at 5 a.m. The logistics driver who enters your defense compound every Tuesday. The IT contractor who has remote access to your production systems. Are they screened to the same standard as your own people?
For most organizations, the honest answer is: we don't know.
That gap between the rigorous screening applied to direct employees and the near-total absence of screening applied to supplier personnel is one of the most underestimated risks in modern supply chain management. Across industries from automotive to defense, from semiconductors to freight forwarding, the people who move through supply chains are increasingly the vectors through which theft, espionage, sabotage, and regulatory failure enter an organization.
This article examines why supplier workforce screening has remained a blind spot, what happens when that blind spot is exploited, and what the emerging regulatory landscape - particularly in the Czech Republic and the EU - now demands. It also sets out a practical framework for procurement leaders who want to close this gap before it becomes a crisis.
The Screening Gap: Why Your Suppliers' People Are Your Problem
Most large organizations have well-established processes for screening their own employees. Pre-employment background checks - criminal records, identity verification, sanctions screening - are standard practice in regulated industries. The logic is straightforward: if someone will have access to your premises, data, or critical systems, you need to know who they are and whether they present a risk.
But the moment that same access is granted to a supplier's employee, the logic breaks down. Procurement contracts may specify service levels, delivery timelines, and pricing. They almost never specify that every individual the supplier deploys must be screened to a defined standard - and even where they do, verification is rare.
The result is a two-tier workforce operating within the same security perimeter. Direct employees are screened. Supplier employees are trusted by proxy - trusted because the contract exists, because the supplier "must have" checked their people, because nobody has ever asked. This is not an oversight in any individual contract. It is a systemic failure in how procurement relationships are structured.
Consider the scale: in many manufacturing, logistics, and infrastructure environments, contractor and supplier personnel outnumber direct employees by two or three to one. In some semiconductor fabrication facilities, the ratio is even higher. Each of those individuals represents an access point that has never been independently verified.
The procurement function sits at the center of this problem - and therefore at the center of the solution. Procurement teams select suppliers, negotiate contracts, manage relationships, and oversee performance. They are uniquely positioned to require, verify, and enforce workforce screening standards across the supply chain. But to do that, they need to understand the risk, the regulatory direction, and the tools available.
When the Weakest Link Breaks: Real-World Cases
The consequences of failing to screen supplier workforces are not hypothetical.
Target's $300M Data Breach (2013)
The Target breach (in which 70 million customers' data was compromised) remains the defining case of third-party supply chain risk. The attackers didn't break through Target's firewall. They stole credentials from Fazio Mechanical Services, a small HVAC contractor with access to Target's vendor portal. Fazio's employees had never been subjected to meaningful background screening by Target, and Fazio's own security practices were minimal. The attackers used those credentials to move laterally through Target's network, eventually installing malware on point-of-sale systems across nearly 1,800 stores.
The total cost exceeded $300 million in settlements, legal fees, remediation, and reputational damage. The CEO and CIO both lost their jobs. Target's stock price dropped significantly and consumer trust took years to rebuild. The root cause was not a sophisticated zero-day exploit - it was an unscreened individual at a supplier with access to a critical system.
Notably, Fazio was not a large strategic supplier. It was a small regional contractor - exactly the kind that falls below the threshold of scrutiny. This is the paradox of third-party risk: the smallest, least-visible suppliers often present the largest access risks, precisely because they escape the due diligence applied to major partners.
North Korean IT Worker Infiltration (2020–Present)
Perhaps the most striking contemporary example is the systematic infiltration of Western companies by North Korean IT workers using false identities. Documented extensively by the FBI and U.S. Department of Justice, this scheme involves thousands of operatives obtaining remote contractor positions through staffing agencies, freelance platforms, and subcontractor arrangements - exactly the relationships procurement teams manage.
Revenue (estimated in the hundreds of millions of dollars) funds North Korean weapons programs. In several documented cases, infiltrators also exfiltrated proprietary code, intellectual property, and sensitive internal data. Companies ranging from Fortune 500 technology firms to mid-market European businesses have been identified as victims.
What makes this scheme particularly relevant to procurement is the mechanism. These aren't hackers breaking through firewalls. They're people engaged through legitimate commercial channels who passed interviews but never passed an identity check. They invoice through established payment channels. They deliver work. The only thing they haven't done is prove they are who they claim to be.
If a hostile state can place thousands of operatives into Western supply chains by exploiting the screening gap, the gap is not a minor oversight — it is a strategic vulnerability. The response from governments has been to push responsibility to the companies that engage these workers - and by extension, to the procurement teams that manage those supplier relationships.
GE Aviation Trade Secret Theft (2019)
An engineer at GE Aviation was convicted of conspiring to steal jet engine turbine technology, sending proprietary data to collaborators in China. The investigation revealed that sensitive IP flowed through a network of suppliers with vastly different screening standards. GE's supply chain spans hundreds of companies, each employing specialists with varying access to proprietary data. The screening practices at these suppliers ranged from rigorous to non-existent — and GE had limited visibility into which was which.
UK Food Supply Chain Contamination (2008–2020)
Over two decades, temporary agency workers with undisclosed criminal histories were repeatedly placed in food handling roles by staffing agencies conducting no background checks. In one 2008 incident, a contractor employee at a meat processing plant (with a prior conviction that had never been checked) was involved in deliberate product contamination costing an estimated £12 million in recalls.
ASCO Industries Ransomware Shutdown (2019)
ASCO, a Belgian aerospace supplier to Airbus, Boeing, and Lockheed Martin, was hit by ransomware that shut production across four countries for weeks. The breach was consistent with compromised credentials - the kind of access contractor personnel routinely hold. Over 1,000 employees were sent home.
The Common Thread
Every case follows the same pattern: an individual in the supply chain who was never properly vetted. The damage ranges from millions in financial losses to national security compromise. And for every incident that becomes public, security professionals estimate many more go undetected.
Why Supplier Screening Falls Through the Cracks
If the risk is so clear, why do most procurement teams still not address it?
The contractual illusion. Most contracts include broad clauses requiring suppliers to "maintain appropriate security measures." In practice, these are almost never enforced or audited. A supplier can sign a contract promising screened personnel, then subcontract to a staffing agency that conducts no checks. The procuring organization has a piece of paper. It does not have assurance.
The cost perception. Adding screening requirements is perceived as adding cost. This is almost always wrong. A comprehensive background check costs €20–€80 per individual. A single supply chain compromise routinely costs millions. The return on investment is not marginal - it is overwhelming.
The jurisdictional complexity. Cross-border screening means navigating different legal frameworks, data sources, and privacy regulations. A Czech company with German suppliers, Polish assembly, and Slovak distribution faces four legal environments. This complexity is real, but modern screening platforms are designed to handle it through a single interface - which is precisely what Scaut was built to do.
The reputational blind spot. When a supply chain incident becomes public, the headline names your brand, not the subcontractor. A company's reputation is effectively held by the weakest screening practices in its supply chain.
The organizational silo. HR screens direct employees. Security manages facility access. Procurement owns the supplier relationship but not the personnel question. Nobody is systematically asking: are the supplier's people screened? Breaking this silo requires procurement to become the enforcement mechanism - the function that builds screening into contracts and verifies compliance.
The Regulatory Tipping Point: "Should" Is Becoming "Must"
Czech Critical Infrastructure Act (ZKI)
The 2025 Act on Critical Infrastructure requires critical entities and their suppliers to verify the reliability of all personnel with access to critical assets - identity verification and criminal record checks as a minimum. By March 1, 2026, all personnel of critical suppliers must be verified, with fines up to CZK 50 million for non-compliance. Regulators have the power to audit compliance and require evidence of screening processes.
The practical implications are substantial. Procurement teams must identify every supplier whose personnel access critical assets, define screening requirements, embed them in contracts, and verify compliance on an ongoing basis. For organizations with hundreds of active suppliers, this is an operational challenge that manual processes simply cannot address within the available timeframe.
The ZKI also introduces the concept of "critical suppliers" - those whose disruption or compromise would materially affect the operation of the critical entity. These suppliers face heightened obligations, including demonstrating their own screening practices to the critical entity and to regulators. Procurement teams are the natural enforcement point for this requirement.
EU NIS2 and CER Directives
NIS2 explicitly requires essential entities to address supply chain security, including relationships with direct suppliers. Article 21 is unambiguous: organizations must address "security-related aspects concerning the relationships between each entity and its direct suppliers or service providers." National implementations across the EU are interpreting this as requiring workforce-level verification. The parallel CER Directive requires background checks on personnel in sensitive roles (explicitly including personnel performing functions on behalf of third parties).
Together, these create a comprehensive regulatory framework where workforce screening is not a recommendation but a legal requirement. Fines under NIS2 reach €10 million or 2% of global turnover for essential entities. These are not theoretical maximums - regulators across the EU have signaled clearly that enforcement will be active and that supply chain failures will be treated as organizational failures.
The regulatory direction across Europe is unmistakable: if people are in your supply chain, you must know who they are. The era of voluntary best practice is giving way to mandatory compliance, and procurement teams are on the front line of that transition.
The Hidden Costs of Doing Nothing
Beyond regulatory fines, the costs are cumulative and often hidden. Cargo theft in Europe exceeds €8.2 billion annually (TAPA, 2022), with a significant proportion involving insider knowledge from supply chain personnel. IP theft costs European industry an estimated €60 billion per year (European Commission). Civil liability for breaches caused by unscreened supplier personnel can be devastating - Target's costs exceeded $300 million for a single incident.
Operational disruption adds another layer. When a supply chain compromise occurs, the immediate impact is severe: production stoppages, facility lockdowns, IT shutdowns, and emergency audits consume management time, disrupt delivery schedules, and damage customer relationships. The ASCO Industries attack halted production across four countries for weeks - all traceable to compromised access credentials.
Some organizations, confronted with the need for supplier screening, begin exploring internal solutions - patching together criminal record providers across jurisdictions, building manual identity verification workflows, creating spreadsheet-based compliance tracking. This approach almost always fails. The jurisdictional complexity of cross-border screening requires specialist knowledge of data sources, legal frameworks, and privacy regulations in each country. The technology infrastructure - API integrations with criminal record databases, identity verification systems, sanctions lists - takes years and millions of euros to build. And the regulatory landscape evolves continuously, requiring constant updates to remain compliant.
Purpose-built screening platforms exist precisely because this problem is too complex and too specialized for most organizations to solve alone. The economics are clear: a platform that costs a fraction of a single compliance failure is not an expense - it is insurance with a guaranteed return.
Building a Supplier Screening Program: A Practical Framework
Step 1: Map your risk surface. Identify which suppliers have personnel accessing your premises, systems, or data. This is not limited to large strategic suppliers - it includes cleaning companies, maintenance contractors, IT providers, logistics operators, catering firms, and staffing agencies. In many organizations, the highest-risk access points are held by the smallest, least-visible suppliers. Create a risk-tiered classification: critical access (physical entry to secure areas, access to critical systems), elevated access (regular on-site presence), and standard access (occasional, limited presence). Screening requirements should be calibrated to each tier.
Step 2: Define your screening standard. For critical access: identity verification, criminal records (domestic and international where relevant), sanctions and watchlist screening, and financial integrity checks for fiduciary roles. For elevated access: identity verification and criminal records. For standard access: identity verification. Document this clearly - it becomes the contractual baseline for every supplier and the standard against which compliance will be measured.
Step 3: Embed screening in procurement contracts. Broad clauses like "supplier shall comply with all applicable laws" are unenforceable in practice. Be specific: which checks are required for each access tier, the obligation to screen all personnel before granting access, the right to audit compliance and request evidence, the consequences of non-compliance including contract termination, and the requirement to notify of any material changes. This is not boilerplate - it is an enforceable obligation that shifts responsibility from assumption to verification.
Step 4: Automate. Manual processes don't scale. If you have 200 suppliers deploying 5,000 people across three countries, spreadsheets and email chains won't cut it. You need a platform that automates the entire workflow - from inviting supplier personnel to complete checks, through identity verification and criminal record screening across jurisdictions, to real-time compliance dashboards and audit-ready reporting. This is the core of what Scaut provides: automated screening across the Czech Republic and 30+ European jurisdictions through a single interface, so procurement teams can manage supplier compliance at scale without creating bottlenecks.
Step 5: Monitor continuously. Screening is not a one-time event. Criminal records update. Sanctions lists evolve. People's circumstances change. A supplier employee who was clean at the point of hire may present a different risk profile two years later. Implement re-screening at defined intervals and real-time alerts for changes in sanctions or adverse media status. Use the data to refine your risk tiers and improve supplier selection over time.
Industry Perspectives
Automotive. Supply chains spanning hundreds of suppliers across dozens of countries. The shift to EVs and autonomous driving introduces sensitive battery chemistry, sensor calibration, and AI training data flowing through networks with limited visibility into who is handling them. The Volkswagen Dieselgate case demonstrated that fraud can persist across multi-tier supply chains for years. Supplier qualification frameworks like IATF 16949 are beginning to incorporate personnel security expectations - screening evidence will become a standard audit element within the next two to three years. Tier-1 suppliers that cannot demonstrate screening capabilities risk losing contracts to competitors who can.
Defense and Aerospace. Governments across Europe are tightening personnel vetting for anyone accessing defense programs, including subcontractor personnel at every tier. The GE Aviation case and broader trends of state-sponsored economic espionage have driven defense primes to impose detailed screening requirements on their supply chains. Suppliers who cannot demonstrate compliant processes face disqualification from programs, loss of security clearances, and exclusion from bid lists.
Freight and Logistics. Personnel have physical access to goods in transit with minimal direct supervision. The TAPA cargo theft figures - €8.2 billion annually in Europe - reflect a reality in which supply chain insiders are frequently the enablers of loss. Clients increasingly require evidence of workforce screening as a condition of awarding contracts, particularly for high-value, pharmaceutical, and defense-related cargo. For logistics procurement teams, screening is not just about compliance - it is about commercial survival.
Semiconductors and High-Tech. Fab access means access to technology worth billions in R&D investment, process secrets that define competitive advantage, and equipment subject to export controls. Contractor personnel - maintenance technicians, calibration specialists, cleanroom staff - often spend more time inside fabs than the chipmaker's own engineers. Governments are increasingly linking public funding, including EU Chips Act subsidies, to evidence of supply chain security measures. Procurement teams that cannot demonstrate workforce screening across their supplier base may find themselves ineligible for the funding designed to support their competitiveness.
The Path Forward
Supplier workforce screening is transitioning from an afterthought to a strategic imperative. Organizations that act now gain regulatory readiness before deadlines hit, supply chain resilience through knowing who is actually in their ecosystem, and competitive differentiation in procurement markets where screening is becoming a contract requirement.
Every week of delay is a week in which unscreened individuals continue to access your sites, systems, and sensitive assets. It is a week closer to regulatory deadlines that will not be extended. And it is a week in which competitors who have already started are building the compliance infrastructure that makes them preferred partners.
The gap between screening your own people and screening your suppliers' people is the most significant unaddressed risk in most supply chains today. It is also the most addressable. The technology exists. The regulatory framework is arriving. The cost of inaction is rising.
The choice - and the responsibility - sits squarely with procurement.




