Security Think Tank: Business cannot outsource accountability

What should and what should not be outsourced in IT security?

You can in theory outsource anything except accountability and crisis management. It’s all down to risk appetite, assuming of course that your outsourcer meets compliance requirements.

Security is all about visibility and control. You lose both when you outsource, but independent contractors can be used to check on other outsourced activities.

The paradigm for trust is also changing for the information age. The old regime is neatly summed up by the old Russian quote, “Trust is good, but control is better” (equally ascribed to both Stalin and Lenin).

The new philosophy is encapsulated by Ronald Reagan’s famous quote, “Trust but verify”.

David Lacey is the UK research director for the Information Systems Security Association (ISSA)

Read more about IT security outsourcing

Security Think Tank: Start with capability gap when outsourcing security

Security Think Tank: Outsourcing of IT security is not for everyone

Security Think Tank: No one-size-fits-all approach to security outsourcing




Read more on IT outsourcing

Join the conversation


Send me notifications when other members comment.

Please create a username to comment.

outsourcing is the key to get quality software development done.


Outsourcing is used for transfer or delegation to an external service provider the operation and day-to-day management of a business process.


In a revenue share deal, it can be applied when the supplier would make application for a consumer advertising it to consumers afterwards. The service provider builds up application at a decreased price.