Manage Third-Party Service Security Outsourcing Research & Tools
Start here – read the Executive Brief
Read our concise Executive Brief to understand
how to avoid common mistakes when it comes to outsourcing security, review
Info-Tech’s methodology, and understand the four ways we can support you in completing
this project.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
1. What to outsource
Identify different
responsibilities/functions in your organization and determine which ones can be
outsourced.
Complete a cost analysis.
- Manage Third-Party Service Security Outsourcing – Phase 1: What to Outsource
- Insourcing vs. Outsourcing Costing Tool
2. How to outsource
Identify a list of features
for your third-party provider and analyze.
- Manage Third-Party Service Security Outsourcing – Phase 2: How to Outsource
- MSSP Selection Tool
- Checklist for Third-Party Providers
3. Manage your third-party provider
Understand how to align third-party providers to your organization.
- Manage Third-Party Service Security Outsourcing – Phase 3: Manage Your Third-Party Provider
- Security Operations Policy for Third-Party Outsourcing
- Third-Party Security Policy Charter Template