1.3.3—1.3.3
>Control Description
+ External IT services are not used without explicit assessment and implementation of the information security requirements:
- A risk assessment of the external IT services is available,
- Legal, regulatory, and contractual requirements are considered.
+ The external IT services have been harmonized with the protection need of the processed information assets.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.