A software development agency delivers a customer portal on time and within budget. Post-launch, a security audit reveals hardcoded credentials, missing input validation and a dependency on a library with a known critical vulnerability. The contract says nothing about security standards, and the agency has moved on to other projects. A.8.30 ensures that outsourced development meets your security standards — through clear requirements, contractual controls and verification.
When you outsource development, you delegate the work — you do not delegate the accountability. This control requires organizations to communicate security requirements, monitor compliance and verify results throughout the engagement.
What does the standard require?
- Communicate security requirements. Clearly define and agree security standards with the external developer before work begins.
- Include security in contracts. Contracts must specify secure coding practices, testing obligations, audit rights, IP ownership and incident notification.
- Monitor and review. Regularly assess the external developer’s work for compliance with security requirements.
- Conduct acceptance testing. Perform security testing on delivered code before deploying it.
- Arrange code escrow. Where appropriate, establish code escrow agreements to protect against supplier failure.
In practice
Define security requirements in the contract. Specify: secure coding standards to follow, minimum security testing requirements (SAST, DAST), dependency management obligations, vulnerability disclosure timelines and your right to conduct independent security assessments.
Conduct incoming security reviews. Scan every code delivery with SAST and SCA tools. For high-risk components, commission manual security reviews. Reject deliveries that fail security acceptance criteria.
Require evidence of secure practices. Ask suppliers to provide: SAST scan results, dependency audit reports, evidence of code review and developer security training records. Verify these claims through your own testing.
Maintain ongoing oversight. For long-term engagements, conduct periodic security assessments of the supplier’s development practices. Review their incident response capability and verify they are maintaining the agreed security standards.
Typical audit evidence
Auditors typically expect the following evidence for A.8.30:
- Contracts with security clauses — documented security requirements in supplier agreements (see Secure Software Development Policy in the Starter Kit)
- Security acceptance test results — SAST/SCA scans of delivered code
- Supplier assessment records — periodic evaluations of supplier security practices
- Code escrow agreements — where applicable
- Incident notification records — evidence that suppliers report security issues
KPI
Percentage of outsourced development contracts with enforced security requirements
Measured as a percentage: how many of your outsourced development contracts include security requirements that are actively verified? Target: 100%.
Supplementary KPIs:
- Percentage of code deliveries that pass incoming security review on first submission
- Number of security findings in outsourced vs. in-house code (comparison)
- Percentage of suppliers with verified secure development practices
BSI IT-Grundschutz
A.8.30 maps to BSI modules for outsourcing and supplier management:
- OPS.2.3 (Use of External IT Services) — security requirements for outsourced IT services, including development.
- APP.7 (Development of Individual Software) — requirements applicable to externally developed custom software.
Related controls
- A.5.19 — Information Security in Supplier Relationships: The overarching supplier security framework.
- A.8.25 — Secure Development Life Cycle: The SDLC standards that outsourced developers must follow.
- A.8.29 — Security Testing in Development and Acceptance: Acceptance testing for outsourced deliveries.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.8.30 — Outsourced development
- ISO/IEC 27002:2022 Section 8.30 — Implementation guidance for outsourced development
- BSI IT-Grundschutz, OPS.2.3 — Use of External IT Services