Skip to main content

๐Ÿ’ผ 63 Evaluation of the design of information security controls of third parties and related parties necessitates an understanding of the controls in place or planned. This can be maintained over time through a combination of interviews, surveys, control testing, certifications, contractual reviews, attestations and independent assurance assessments. Controls identified can then be compared to common industry controls and considered in light of controls within the regulated entity as well as the nature of the information assets involved. Any capability gaps identified would be addressed in a timely manner.

  • Contextual name: ๐Ÿ’ผ 63 Evaluation of the design of information security controls of third parties and related parties necessitates an understanding of the controls in place or planned. This can be maintained over time through a combination of interviews, surveys, control testing, certifications, contractual reviews, attestations and independent assurance assessments. Controls identified can then be compared to common industry controls and considered in light of controls within the regulated entity as well as the nature of the information assets involved. Any capability gaps identified would be addressed in a timely manner.
  • ID: /frameworks/apra-cpg-234/25/63
  • Located in: ๐Ÿ’ผ 25 Implementation of controls - Information assets managed by third parties and related parties

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-c-0fa58b86

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags