Rhand Leal
October 10, 2017
To focus on their core business, many organizations rely on outsourced suppliers to perform support processes. While this approach may bring benefits like costs savings, and access to expert knowledge and state-of-the-art technology, it can also involve risks related to loss of control over how these processes are performed and managed.
To minimize such risks, organizations should adopt practices to ensure that the processes and deliverables of outsourced suppliers are exactly what they are paying for.
This article will present some solutions that organizations should consider when performing audits of outsourced suppliers that could impact their information security. These suggestions are based on controls recommended by ISO 27001, the leading international standard for information security management.
Yes. Basically, there are three types of audits that can be performed, which depend on the relationship between the auditor and the auditee: first-, second-, and third-party audits. For the purpose of this article, only second-party audits will be covered. For information about first- and third-party audits, please see First-, Second- & Third-Party Audits, what are the differences?
Second-party audits involve two independent organizations that have a relationship established between them. The most common scenario is a customer auditing a supplier, but you also can have a regulatory body auditing an organization that operates in an industry it oversees.
As a customer, you can either use your own personnel to perform a second-party audit on your supplier, or you can hire an external auditor/organization to perform the audit on your behalf.
First of all, the right of a customer to audit its supplier has to be clearly established in the service agreement or contract with the supplier. This agreement/contract is the main document to define:
ISO 27001 has specific security controls requiring these issues to be established, and the more specific and clear they are, the easier the audit will become. For more information, see 6-step process for handling supplier security according to ISO 27001 and Which security clauses to use for supplier agreements?
The good news is that the main steps for a second-party audit are practically the same as those required for an internal audit:
So, if your organization already has an audit process in place, or if your organization is thinking about implementing an audit process, you can apply this same process to your suppliers.
Considering ISO 27001 controls from section A.15, and the most common security clauses applicable to service agreements/contracts, on the supplier’s premises, an auditor should look for, at a minimum, evidence regarding:
Of course, as mentioned previously, the auditor must have the relevant service agreements/contracts on hand, so he can identify additional evidences that may be applicable to your specific scenario (e.g., tests of business continuity plans).
The motto “security is only as strong as its weakest link” applies well to the customer-supplier relationship, making auditing practices essential to ensuring that operations are being performed as agreed and expected results are being achieved.
By considering the controls and recommendations of ISO 27001 regarding information security in suppliers’ relationships, an organization can ensure not only that its suppliers are handling its information properly, but that both customer and supplier have good visibility of all the processes and can act in a timely manner to prevent information compromise.
To learn more about auditing techniques, see this free online training ISO 27001 Lead Auditor Course.