S 2.255 Secure migration in outsourcing projects

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: IT Security Officer, Head of IT, Administrator

After having commissioned the outsourcing service provider, a preliminary security policy must initially be drawn up also addressing the test and introduction phases as a sub-aspect of the outsourcing project. On the one hand, numerous outsiders are involved in this phase, and on the other hand, procedures must be established, tasks must be commissioned, and systems must be configured newly and/or adapted. Therefore, careful test operations are extremely important. "Flexible" and "uncomplicated" solutions which rarely provide sufficient security are selected particularly for test purposes and in phases of high workloads. Thus, it must be ensured that productive data is not used as test data without specific protection, for example. This must be ruled out by the security policy.

Before drawing up a migration concept as part of the security policy for an outsourcing project, a security management team must have been set up by the customer specifically for the migration phase. During the migration phase, this team must be mindful of security matters and ensure that secure IT operations are guaranteed during migration by means of suitable safeguards taken prior to migration. Here, the extent of the security management team depends on the type and extent of the outsourcing project; as a minimum requirement, it may comprise one security expert.

The security management team has the following tasks, from which regulations and specifications are derived, which must be included in the migration concept:

During the introduction phase of the outsourcing project and the first operation period, particular attention should be paid to the contingency concept. Until all persons involved have adopted the required routine, for example in handling malfunctions and security-relevant incidents, employees must be obligated to on-call duty to a greater extent.

Upon completion of the migration, it must be ensured that the security policy is updated, since experience has shown that the migration phase always entails changes. In particular, this has the following consequences:

As a final task, the outsourcing project must be transferred to regular operations upon completion of the migration phase (see S 2.256 Planning and maintenance of IT security during ongoing outsourcing operations). In doing so, it must be ensured that all exceptions required during the migration phase are reversed at the end of the migration phase, e.g. extended access rights.

Review questions: