Under active development Content is continuously updated and improved

PS-7External Personnel Security

>Control Description

Third-party personnel who have access to the enterprise’s information systems and networks must meet the same personnel security requirements as enterprise personnel. Examples of such third-party personnel can include the system integrator, developer, supplier, external service provider used for delivery, contractors or service providers who are using the ICT/OT systems, or supplier maintenance personnel brought in to address component technical issues not solvable by the enterprise or system integrator.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.