Include security in the organisation’s procurement process. Determine ICT security specifications when procuring any type of ICT product or service, see principle 2.2 – Establish a secure ICT architecture. Include life cycle security from procurement to disposal.
Whenever new data systems are acquired, a pre-defined procurement process and rules are followed. The rules ensure that the supplier is able to guarantee an adequate level of security, taking into account the priority of the system.
Whenever new data systems are acquired or developed, pre-defined security rules are followed, taking into account the priority of the system. The rules ensure that adequate measures are taken to ensure the security of the data and data processing in the system.
Organization must ensure in advance that the acquired data systems are secure. In order to ensure this, the supplier of the important data system to be acquired must be required to provide sufficient security-related clarifications already at the procurement stage.
The supplier must clarify at least the following: