PS-7—External Personnel Security
>Control Description
Third-party personnel who have access to the enterprise’s information systems and networks must meet the same personnel security requirements as enterprise personnel. Examples of such third-party personnel can include the system integrator, developer, supplier, external service provider used for delivery, contractors or service providers who are using the ICT/OT systems, or supplier maintenance personnel brought in to address component technical issues not solvable by the enterprise or system integrator.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.