Systems and applications are delivered and supported by trusted suppliers. (P2:, Australian Government Information Security Manual, March 2021)
Systems and applications are delivered and supported by trusted suppliers. (P2:, Australian Government Information Security Manual, June 2023)
Systems and applications are delivered and supported by trusted suppliers. (P2:, Australian Government Information Security Manual, September 2023)
support decision-making about purchase, re-use, retirement, and disposal of assets (5.2.6 ΒΆ 1 Bullet 4, ITIL Foundation, 4 Edition)
Purchases are made through a third party to shield the institution's identity. (App A Objective 6.19.b, FFIEC Information Technology Examination Handbook - Information Security, September 2016)