S 2.250 Determining an outsourcing strategy

Initiation responsibility: Top Management

Implementation responsibility: Specialists Responsible, Top Management

The commitment to an outsourcing service provider is usually long-term, cost-intensive at first, and poses many risks. It is therefore important to plan the outsourcing project well. The planning must also take security-related aspects into account in addition to the economical, technical, and organisational framework. The following aspects should be considered in this regard:

After initially considering the strategic aspects, it is necessary to determine which tasks or IT applications are generally good candidates for outsourcing.

The importance of the applicable legal framework must not be underestimated. For example, there may be laws generally prohibiting the outsourcing of certain core tasks of an organisation or that place far-reaching conditions on outsourcing and prescribe the involvement of regulatory authorities. In general, the client is still fully responsible for the services or products they provide to their customers or government offices, regardless of whether the client has outsourced individual areas of responsibility.

Unfortunately, the subject of information security is often neglected at the start of planning even though it is of primary importance. This applies to technical as well as organisational security aspects, which play an important role in the outsourcing scenario. In general, the following must be considered in this context:

For this reason, an individual security analysis must always be performed to determine the outsourcing strategy. In the end, this is the only way to determine how to isolate and separate the existing business processes or information systems so that parts of them can be outsourced. In this early project phase, the security concept naturally only describes general conditions and does not contain any detailed safeguards. The security analysis should be performed according to the IT-Grundschutz methodology:

If the protection requirements of important systems or applications are high or it is impossible to model the information system according to IT-Grundschutz, then a supplemental security analysis (e.g. a risk analysis) must be performed. If the security-related threats have already been analysed, then it is possible now to specify if and how these threats will be counteracted.

Ultimately, though, the outsourcing client will still need to bear a certain amount of residual risk. The results of the security analysis flow directly into the costs/benefits estimate.

Management must not only direct their attention to saving costs during the development of a promising, long-term outsourcing strategy. The effects of an outsourcing project on the ability to perform their tasks, the business model, and the service or product portfolio also need to be taken into account. Will standard workflows or core business processes be outsourced? It is important in this regard to ensure the organisation remains sufficiently capable of determining and controlling their own IT requirements. In particular, management should consider the development and maintenance of the IT systems and applications developed in-house.

The following information illustrates the advantages and disadvantages of outsourcing in terms of information security.

A comprehensive costs/benefits analysis is essential to the strategic and economical success of every outsourcing project; it is therefore important to know and correctly assess all parameters.

The strategic value of the following resources must be estimated based on the general conditions of the outsourcing project:

Studies and the experience of other organisations can supply valuable information when performing the cost/benefits analysis.

Finally, the outsourcing strategy must be documented. The goals, opportunities, and risks of the outsourcing project should be described clearly. It is also recommended in this context to integrate the experience gained in the course of an outsourcing project into the documentation of the outsourcing strategy. The documentation should also point out any bad decisions made and derive corresponding recommendations for the future.

Review questions: