December 23, 2021 by Admin
When developing a protection strategy for outsourcing applications, the information security manager MUST ensure that:
- escrow agreements are in place.
- the security requirements are included in the service level agreement (SLA).
- the responsibility for security is transferred in the service level agreement (SLA).
- nondisclosure clauses are in the contract.