Skip to main content
← All controls
SR-2 / CA-2 / SA-9 NIST SP 800-53 Rev 5

Is security due diligence performed before contracting (not as an afterthought)?

Demonstrate that the organization conducts formal security assessments of third parties prior to contract execution, with documented evidence of security evaluation informing contract terms and vendor selection decisions.

Description

What this control does

Security due diligence is a structured evaluation process conducted during vendor selection and contract negotiation, before legal commitment, to assess third-party security posture, compliance status, regulatory alignment, and risk exposure. This process includes reviewing security questionnaires, certifications (SOC 2, ISO 27001), penetration test results, incident history, data handling practices, and subprocessor relationships. Performing this assessment before contract signature enables negotiation of security requirements, service level agreements for security incidents, right-to-audit clauses, and data protection obligations, rather than discovering gaps post-execution when remediation leverage is minimal.

Control objective

What auditing this proves

Demonstrate that the organization conducts formal security assessments of third parties prior to contract execution, with documented evidence of security evaluation informing contract terms and vendor selection decisions.

Associated risks

Risks this control addresses

  • Contracting with vendors possessing inadequate security controls, creating unmitigated supply chain vulnerabilities and unauthorized access pathways to organizational data
  • Legal commitment to services that cannot meet regulatory requirements (GDPR, HIPAA, PCI-DSS) discovered after contract lock-in, triggering compliance violations
  • Inability to negotiate security requirements, audit rights, breach notification timelines, or liability terms after contract signature reduces organizational leverage
  • Vendor incident history or poor security maturity discovered post-engagement leading to costly mid-contract termination and service migration
  • Subprocessor and fourth-party risk exposure unknown until after data sharing commences, violating data sovereignty or residency requirements
  • Budget allocated to vendors lacking required certifications or controls, necessitating expensive compensating controls or contract renegotiation
  • Procurement timelines compressed by treating security as approval gate rather than selection criterion, forcing acceptance of high-risk vendors

Testing procedure

How an auditor verifies this control

  1. Obtain the organization's vendor risk management or third-party security assessment policy to identify the documented due diligence process and triggers.
  2. Select a sample of 10-15 vendor contracts executed within the audit period, stratifying by risk tier (critical/high data access, moderate, low).
  3. For each sampled contract, request pre-contract security assessment documentation including completed questionnaires, scorecard evaluations, or risk assessment reports.
  4. Verify timestamps on security assessments precede contract signature dates by reviewing document metadata, email correspondence, and procurement system records.
  5. Review security assessment content for evidence of evaluation depth: certification verification, control gap identification, data flow analysis, and subprocessor review.
  6. Examine contract documents to confirm security findings influenced negotiated terms such as security schedules, SLAs, audit rights, insurance requirements, or data protection addendums.
  7. Interview procurement and security team members to validate the integration of security assessments into vendor selection scoring and approval workflows.
  8. Identify any contracts executed without documented pre-signature security due diligence and determine if exceptions followed documented waiver or risk acceptance procedures.
Evidence required Security assessment questionnaires, vendor risk scorecards, and third-party certification validations (SOC 2 Type II reports, ISO 27001 certificates) timestamped before corresponding contract execution dates. Procurement workflow records showing security review as approval gate, email correspondence between security and procurement teams discussing vendor findings, and executed contracts containing security schedules or amendments derived from due diligence findings. Exception logs or risk acceptance forms for any contracts approved without completed assessments.
Pass criteria 100% of sampled medium-to-high risk vendor contracts demonstrate documented security due diligence completed and approved prior to contract signature, with evidence that assessment findings informed contract terms or vendor selection decisions, and any exceptions formally documented with compensating controls.