DCH-13.1—Limits of Authorized Use
Weight: 8
>Control Description
Mechanisms exist to prohibit external parties, including Technology Assets, Applications and/or Services (TAAS), from storing, processing and transmitting data unless authorized individuals first:
(1) Verifying the implementation of required security controls; or
(2) Retaining a processing agreement with the entity hosting the external TAAS.
>Cross-Framework Mappings
Canada ITSP 10.171
NIST SP 800-171 Rev 3
NIST SP 800-207 Zero Trust
CMMC 2.0 Level 1
Ask AI
Configure your API key to use AI features.