A well-founded outsourcing policy forms the foundation for structured and regulatorily compliant outsourcing management. It defines the strategic guardrails, decision criteria, and governance principles for all outsourcing activities within the organization. We support you in developing a tailored outsourcing policy.
Our clients trust our expertise in digital transformation, compliance, and risk management
30 Minutes • Non-binding • Immediately available
Or contact us directly:










An effective outsourcing policy should not only fulfill regulatory requirements, but also be practical and integrable into day-to-day operations. Pay attention to clear, understandable language and ensure that the policy is understood and accepted by all relevant stakeholders. A policy that is overly complex or disconnected from practice often remains ineffective.
Years of Experience
Employees
Projects
When developing an outsourcing policy, we proceed systematically and collaboratively to achieve a result that is both regulatorily sound and practically applicable.
Analysis of the status quo and regulatory requirements
Stakeholder interviews and requirements gathering
Development of the core elements of the outsourcing policy
Review and alignment with relevant business units
Finalization and support during implementation
"A well-designed outsourcing policy is more than a regulatory requirement — it is a valuable management instrument. It creates clarity on objectives, principles, and responsibilities, and enables well-founded decisions that are aligned with the corporate strategy."

Head of Information Security, Cyber Security
Expertise & Experience:
10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security
We offer you tailored solutions for your digital transformation
We develop an outsourcing policy tailored to your specific requirements that fulfills regulatory requirements and is practical to implement.
We support you in revising and updating your existing outsourcing policy to integrate new regulatory requirements and improve effectiveness.
We accompany you in the successful introduction and implementation of your outsourcing policy in day-to-day business operations.
Choose the area that fits your requirements
Integration of environmental, social, and governance criteria (ESG) into your outsourcing strategy and processes for sustainable corporate success and risk minimisation.
An effective governance framework forms the organizational backbone for structured outsourcing management. It defines clear responsibilities, decision-making paths, and control mechanisms for all outsourcing activities within the company. We support you in designing and implementing a tailored governance framework.
An outsourcing policy under MaRisk AT
9 must include: Strategic principles for outsourcing decisions, criteria for distinguishing material from non-material outsourcing arrangements (materiality criteria), risk analysis requirements prior to each outsourcing, governance structure with clear roles and responsibilities including an outsourcing officer, minimum contractual requirements per KWG 25b, specifications for the outsourcing register and processes for ongoing monitoring and annual reporting to the management board.
Under MaRisk AT 9, an outsourcing arrangement is material when the outsourced activity could significantly impair the institution's financial position, business strategy or regulatory compliance if it fails or is performed inadequately. Material outsourcings are subject to stricter requirements: comprehensive risk analysis, detailed contracts with audit and access rights, mandatory notification to BaFin via the MVP portal since
2023 and ongoing monitoring. Non-material outsourcings require simplified risk analysis and documentation but must still be recorded in the outsourcing register.
BaFin supervises compliance with outsourcing requirements by credit institutions and financial service providers. Specifically, BaFin requires: A documented outsourcing policy as part of risk management, notification of material outsourcing arrangements via the MVP portal (mandatory since 01.01.2023 under FISG), a current outsourcing register covering all material and non-material outsourcings, annual reports to the management board on all material outsourcing arrangements. BaFin reviews the adequacy of outsourcing management during special examinations and annual audits (Section
44 KWG).
Under MaRisk, outsourcing exists when another company is tasked with performing activities and processes related to banking business, financial services or other institution-typical services that the institution would otherwise perform itself. Third-party procurement (sonstiger Fremdbezug) covers services that do not constitute banking business and do not replace institution-typical activities, such as facility cleaning or catering. This distinction is critical because only outsourcing arrangements are subject to the strict MaRisk AT
9 requirements.
Since January 2025, the Digital Operational Resilience Act (DORA) supplements MaRisk requirements for ICT services. DORA additionally requires: An ICT third-party register (Register of Information), stricter requirements for ICT providers with critical functions, incident reporting within
4 hours for major ICT incidents, regular Threat-Led Penetration Tests (TLPT) and exit strategies for critical ICT outsourcings. Institutions must extend their outsourcing policy with DORA-specific provisions and manage the parallel governance of MaRisk outsourcings and DORA ICT third-party arrangements.
The outsourcing register is a mandatory document under MaRisk AT 9. It must contain: Description of the outsourced activity and its criticality classification, name and location of the outsourcing provider, contract duration and termination periods, risk analysis results, information on sub-outsourcing arrangements, assignment to the responsible outsourcing officer. Since the 6th MaRisk amendment, the register must cover both material and non-material outsourcings and be kept up to date. For ICT outsourcings, DORA additionally requires a separate Register of Information.
ADVISORI supports banks and financial institutions in developing and implementing a MaRisk-compliant outsourcing policy: Gap analysis of the existing policy against MaRisk AT 9, KWG 25b, EBA Guidelines and DORA requirements, drafting or revision of the outsourcing policy with practical materiality criteria, setup of the outsourcing register and BaFin notification processes, implementation of governance structures and monitoring processes, training of relevant departments and alignment with internal audit. Our approach combines regulatory compliance with operational efficiency.
Discover how we support companies in their digital transformation
Klöckner & Co
Digital Transformation in Steel Trading

Siemens
Smart Manufacturing Solutions for Maximum Value Creation

Festo
Intelligent Networking for Future-Proof Production Systems

Bosch
AI Process Optimization for Improved Production Efficiency

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.
Our clients trust our expertise in digital transformation, compliance, and risk management
Schedule a strategic consultation with our experts now
30 Minutes • Non-binding • Immediately available
Direct hotline for decision-makers
Strategic inquiries via email
For complex inquiries or if you want to provide specific information in advance
Discover our latest articles, expert knowledge and practical guides about Outsourcing Policy

Cyber insurance covers financial losses from cyberattacks, data breaches, and IT outages. This guide explains what insurers require in 2026, coverage types, costs by company size, and how to choose the right policy — including how ISO 27001 certification reduces premiums.

Over 30,000 CVEs are published annually. Effective vulnerability management prioritizes what matters most to your organization and remediates before attackers exploit. This guide covers the full lifecycle: discovery, scanning, risk-based prioritization, remediation, and compliance.

The human layer remains the weakest link in cybersecurity. This guide covers how to build an effective security awareness program, run phishing simulations, design role-based training, and measure whether your program actually reduces risk — with benchmarks and KPIs.

Penetration testing reveals vulnerabilities before attackers exploit them. This comprehensive guide covers black box, grey box, and white box methods, the 5-phase pentest process, provider selection criteria, DORA TLPT requirements, and cost benchmarks for every test type.

Business continuity software automates BIA, plan management, exercise tracking, and incident response. This comparison reviews leading BCM platforms, selection criteria, DORA alignment, and which solution fits organizations at different maturity levels.

SOC 2 and ISO 27001 are the most requested security certifications. This practical comparison covers scope, cost, timeline, customer expectations, regulatory alignment, and the 70% control overlap — helping you decide which to pursue (or whether you need both).