Conduct an organizational assessment of risk prior to the acquisition or outsourcing of information security services; and Verify that the acquisition or outsourcing of dedicated information security services is approved by personnel or roles.
Information security services include the operation of security devices, such as firewalls or key management services as well as incident monitoring, analysis, and response. Risks assessed can include system, mission or business, security, privacy, or supply chain risks.
an organizational assessment of risk is conducted prior to the acquisition or outsourcing of information security services; personnel or roles approve the acquisition or outsourcing of dedicated information security services.
No cross-framework mappings available