S 2.254 Creating a security concept for the outsourcing project

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: IT Security Officer, Administrator, Head of IT

For every outsourcing project a security concept must exist. This can be created on the basis of the IT-Grundschutz catalogues, for example. Outsourcing projects are characterised by the fact that many technical and organisational details are only revealed in the course of planning and during migration of the system. Therefore, the security concept which is developed after a service provider has been commissioned will rarely be complete and final from the beginning on and must be continuously developed and substantiated by all parties involved during the migration phase. For this reason, the migration phase is decisive for the success of the overall project and is explained in detail in safeguard S 2.255 Secure migration in outsourcing projects.

In general, security concepts for outsourcing projects are not much different from security concepts for internally operated IT systems. However, there are the following particularities which must be taken into account:

The security requirements specified in S 2.251 Specification of the security requirements for outsourcing projects and S 2.253 Contractual arrangements with the outsourcing service provider form the basis for the security concept. The basic requirements described here must be used as a basis for the detailed design of the security concept. This may, for example, include the detailed description of the safeguards and the identification of the contact persons by name.

Experience has shown that the migration of tasks and IT systems from the client to the outsourcing service provider is a project phase with an increased risk of security incidents. For this reason, regulations and safeguards regarding migration must be covered by the security concept. These are covered in more detail by S 2.255 Secure migration in outsourcing projects.

In the following, some aspects and topics are listed which should be described in detail in the security concept. As the details of a security concept directly depend on the outsourcing project, the list is only intended as an initial starting point and is by no means complete. In addition to an overview of the threat scenario, which serves for motivation of the security safeguards, and the organisational, infrastructural, and personnel security safeguards, it may also be useful to implement safeguards for the following areas:

Organisation

Hardware/software

Communication

Controls and QA

Contingency Planning

Review questions: