Relevant information security requirements should be established and agreed with each supplier based on the type of supplier relationship.
Relevant information security requirements should be established and agreed with each supplier based on the type of supplier relationship.