
A.16.1.1: Responsibilities and Procedures
Establish responsibilities and procedures to ensure a quick, effective, and orderly response to information security incidents.

A.15.2.2: Managing Changes to Supplier Services
Manage changes to supplier services, including maintaining and improving existing information security policies, procedures, and controls.

A.15.2.1: Monitoring and Review of Supplier Services
Regularly monitor, review, and audit supplier service delivery to ensure information security requirements are being met.

A.15.1.3: Information and Communication Technology Supply Chain
Address information security within the information and communication technology supply chain.

A.15.1.2: Addressing Security in Supplier Agreements
Ensure that agreements with suppliers include requirements to address the information security risks associated with information and communications technology services and product supply chain.

A.15.1.1: Information Security Policy for Supplier Relationships
Ensure that suppliers agree and can demonstrate they provide appropriate security controls.