What considerations should be made when outsourcing IT infrastructure?

Expert Peter Wood explains how to investigate a partner's security posture when your IT infrastructure is outsourced.

What security considerations should be made when outsourcing IT infrastructure, particularly with the network?
When outsourcing IT infrastructure, the first and most important thing is to ensure the contract requires your outsourcing partner to take security seriously, and will conform to your information security policy and standards (assuming you have them).

If you need an independent set of standards, then ISO/IEC 27002:2005 -- the Code of Practice for Information Security, is a good place to start. The information security guidelines and principles can be used as a checklist to determine the weaknesses in a company's general security posture.

You also need to ensure the contract gives you the right to audit and penetration test the infrastructure, processes and procedures.

If your proposed outsourcing partner is not able to respond proactively when you talk about security and audits, then you may wish to look elsewhere.
This was last published in May 2009

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.






  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...