1. ISACA. (2016). CISM Review Manual
15th Edition. In Domain 3: Information Security Program Development and Management
the section on Third-Party Relationships emphasizes that contracts must include provisions for monitoring compliance. It states
"The contract should also include a 'right to audit' clause that allows the enterprise to check for compliance with the terms of the contract" (p. 168). This directly supports that the right to audit is the key mechanism for confirmation.
2. Carnegie Mellon University
Software Engineering Institute. (2011). CERT Resilience Management Model (CERT-RMM)
Version 1.2. The Supplier Agreement Management (SAM) process area
Specific Goal 3 (SG 3)
focuses on ensuring suppliers perform as agreed. Specific Practice 3.2 (SP 3.2) is "Verify that the supplier is complying with its obligations." The model notes that verification activities can include "audits of the supplier’s processes and practices
" reinforcing the importance of audit as a verification mechanism. (p. 318).
3. National Institute of Standards and Technology (NIST). (2020). NIST Special Publication 800-53
Revision 5: Security and Privacy Controls for Information Systems and Organizations. Control SA-9
"External Information System Services
" requires organizations to define and implement "processes and procedures for monitoring control compliance by external service providers." The discussion section explicitly mentions that monitoring can include "reviewing external service provider-supplied reports and documentation
and/or conducting audits." This highlights auditing as a primary method for confirming compliance. (p. 279).