S 2.251 Specification of the security requirements for outsourcing projects

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: IT Security Officer, Head of IT, Administrator

If an outsourcing strategy was specified the security requirements must be defined in enough detail so that they can be used as a basis for choosing a suitable service provider. For this purpose, security requirements must be placed on the outsourcing service provider, the technology used (including communication lines and services) but also on the client organisation itself. The creation of a detailed security concept, which is based on the requirements formulated here and developed after choosing the service provider, is described in S 2.254 Creating a security concept for the outsourcing project.

It must be considered that the definition of security requirements is an iterative process:

In general, the following minimum security requirements apply to outsourcing scenarios:

Relevant laws and regulations must, of course, be observed additionally. Particularly in cases where clients or service providers operate on an international or global level, this may involve a lot of effort.

As part of the security requirements, it must be specified which rights (e.g. site access rights, access rights to files and systems) the outsourcing service provider is granted by the client.

The requirements regarding infrastructure, organisation, personnel and technology must be described. In many cases the obligation to meet a security level corresponding to IT-Grundschutz is sufficient. If any requirements exceeding this exist, these must be described in detail. This depends primarily on the security strategy and the existing systems and applications. For example, the following points could be specified in detail depending on the outsourcing project:

Organisational rules and processes

Hardware/software

Communication

Controls and QA

The specified IT security requirements generally form the basis for choosing a suitable outsourcing service provider. However, it may be necessary to adapt special IT security requirements to the IT security level that can be implemented by the service provider.

Review questions: