When developing a protection strategy for outsourcing applications, the information security manager MUST ensure that:

Last Updated on December 23, 2021 by Admin

When developing a protection strategy for outsourcing applications, the information security manager MUST ensure that:

  • escrow agreements are in place.
  • the security requirements are included in the service level agreement (SLA).
  • the responsibility for security is transferred in the service level agreement (SLA).
  • nondisclosure clauses are in the contract.