This document discusses using third-party verification IP (VIP) while sufficiently shielding the in-house verification environment. It considers where to instantiate third-party VIP and how it should be utilized. When a VIP connects to only one side of a data path, questions arise around fully testing the device under test data path, testing the egress path, and who owns the functional layer scoreboard. The document presents considerations for including VIP and discusses VIP shielding to enable swapping out the VIP if needed. It then provides a case study of incorporating a PCI-Express VIP while shielding the verification environment.