Processes and procedures shall be defined and implemented to manage the information security risks associated with the use of supplier’s products or services.
Last updated 2 years ago