An infrastructure team is at the end of a procurement process and has selected a vendor. As part of the final negotiations, there are a number of outstanding issues, including:
Indemnity clauses have identified the maximum liability
The data will be hosted and managed outside of the company’s geographical location
The number of users accessing the system will be small, and no sensitive data will be hosted in the solution. As the security consultant on the project, which of the following should the project’s security consultant recommend as the NEXT step?
- A: Develop a security exemption, as it does not meet the security policies
- B: Mitigate the risk by asking the vendor to accept the in-country privacy principles
- C: Require the solution owner to accept the identified risks and consequences
- D: Review the entire procurement process to determine the lessons learned