1. Home/
  2. Services/
  3. Information Security/
  4. Business Continuity Resilience/
  5. Outsourcing Management/
  6. Strategie/
  7. Auslagerungspolitik

Subscribe to Newsletter

Stay up to date with the latest trends and developments

By subscribing, you agree to our privacy policy.

A
ADVISORI FTC GmbH

Transformation. Innovation. Security.

Office Address

Kaiserstraße 44

60329 Frankfurt am Main

Germany

View on map

Contact

info@advisori.de+49 69 913 113-01

Mon-Fri: 9:00 AM - 6:00 PM

Company

Services

Social Media

Follow us and stay up to date.

  • /
  • /

© 2024 ADVISORI FTC GmbH. All rights reserved.

Your browser does not support the video tag.
Clear Principles. Systematic Management. Regulatory Compliance.

Outsourcing Policy

A well-founded outsourcing policy forms the foundation for structured and regulatorily compliant outsourcing management. It defines the strategic guardrails, decision criteria, and governance principles for all outsourcing activities within the organization. We support you in developing a tailored outsourcing policy.

  • ✓Clear principles and decision criteria for outsourcing arrangements
  • ✓Compliance with regulatory requirements and best practices
  • ✓Transparent governance and control structures
  • ✓Systematic risk minimization in outsourcing arrangements

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

  • Your strategic goals and objectives
  • Desired business outcomes and ROI
  • Steps already taken

Or contact us directly:

info@advisori.de+49 69 913 113-01

Certifications, Partners and more...

ISO 9001 CertifiedISO 27001 CertifiedISO 14001 CertifiedBeyondTrust PartnerBVMW Bundesverband MitgliedMitigant PartnerGoogle PartnerTop 100 InnovatorMicrosoft AzureAmazon Web Services

Outsourcing Policy: Regulatory Requirements and Implementation

Our Strengths

  • Extensive experience with regulatory requirements across various industries
  • Combination of best practices and individual adaptation to your organizational structure
  • Practice-oriented implementation with a focus on applicability in day-to-day business operations
  • Integration of current trends and regulatory developments
⚠

Expert Tip

An effective outsourcing policy should not only fulfill regulatory requirements, but also be practical and integrable into day-to-day operations. Pay attention to clear, understandable language and ensure that the policy is understood and accepted by all relevant stakeholders. A policy that is overly complex or disconnected from practice often remains ineffective.

ADVISORI in Numbers

11+

Years of Experience

120+

Employees

520+

Projects

When developing an outsourcing policy, we proceed systematically and collaboratively to achieve a result that is both regulatorily sound and practically applicable.

Our Approach:

Analysis of the status quo and regulatory requirements

Stakeholder interviews and requirements gathering

Development of the core elements of the outsourcing policy

Review and alignment with relevant business units

Finalization and support during implementation

"A well-designed outsourcing policy is more than a regulatory requirement — it is a valuable management instrument. It creates clarity on objectives, principles, and responsibilities, and enables well-founded decisions that are aligned with the corporate strategy."
Sarah Richter

Sarah Richter

Head of Information Security, Cyber Security

Expertise & Experience:

10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security

LinkedIn Profile

Our Services

We offer you tailored solutions for your digital transformation

Development of a Tailored Outsourcing Policy

We develop an outsourcing policy tailored to your specific requirements that fulfills regulatory requirements and is practical to implement.

  • Analysis of your current outsourcing landscape and processes
  • Identification of relevant regulatory requirements and best practices
  • Development of tailored principles and guidelines
  • Drafting of a comprehensive outsourcing policy

Revision of Existing Outsourcing Policies

We support you in revising and updating your existing outsourcing policy to integrate new regulatory requirements and improve effectiveness.

  • Gap analysis of the existing outsourcing policy
  • Identification of areas for improvement and regulatory gaps
  • Integration of new regulatory requirements and market developments
  • Optimization of the structure and applicability of the outsourcing policy

Implementation Support and Change Management

We accompany you in the successful introduction and implementation of your outsourcing policy in day-to-day business operations.

  • Development of an effective change management strategy
  • Creation of communication materials and training documents
  • Conducting awareness workshops for relevant stakeholders
  • Support during integration into existing processes and systems

Our Competencies in Auslagerungsstrategie

Choose the area that fits your requirements

ESG Criteria

Integration of environmental, social, and governance criteria (ESG) into your outsourcing strategy and processes for sustainable corporate success and risk minimisation.

Governance Framework

An effective governance framework forms the organizational backbone for structured outsourcing management. It defines clear responsibilities, decision-making paths, and control mechanisms for all outsourcing activities within the company. We support you in designing and implementing a tailored governance framework.

Frequently Asked Questions about Outsourcing Policy

What must an outsourcing policy under MaRisk AT 9 contain?

An outsourcing policy under MaRisk AT

9 must include: Strategic principles for outsourcing decisions, criteria for distinguishing material from non-material outsourcing arrangements (materiality criteria), risk analysis requirements prior to each outsourcing, governance structure with clear roles and responsibilities including an outsourcing officer, minimum contractual requirements per KWG 25b, specifications for the outsourcing register and processes for ongoing monitoring and annual reporting to the management board.

What is the difference between material and non-material outsourcing?

Under MaRisk AT 9, an outsourcing arrangement is material when the outsourced activity could significantly impair the institution's financial position, business strategy or regulatory compliance if it fails or is performed inadequately. Material outsourcings are subject to stricter requirements: comprehensive risk analysis, detailed contracts with audit and access rights, mandatory notification to BaFin via the MVP portal since

2023 and ongoing monitoring. Non-material outsourcings require simplified risk analysis and documentation but must still be recorded in the outsourcing register.

What role does BaFin play in outsourcing governance?

BaFin supervises compliance with outsourcing requirements by credit institutions and financial service providers. Specifically, BaFin requires: A documented outsourcing policy as part of risk management, notification of material outsourcing arrangements via the MVP portal (mandatory since 01.01.2023 under FISG), a current outsourcing register covering all material and non-material outsourcings, annual reports to the management board on all material outsourcing arrangements. BaFin reviews the adequacy of outsourcing management during special examinations and annual audits (Section

44 KWG).

How does outsourcing differ from third-party procurement under MaRisk?

Under MaRisk, outsourcing exists when another company is tasked with performing activities and processes related to banking business, financial services or other institution-typical services that the institution would otherwise perform itself. Third-party procurement (sonstiger Fremdbezug) covers services that do not constitute banking business and do not replace institution-typical activities, such as facility cleaning or catering. This distinction is critical because only outsourcing arrangements are subject to the strict MaRisk AT

9 requirements.

What additional requirements does DORA impose on the outsourcing policy?

Since January 2025, the Digital Operational Resilience Act (DORA) supplements MaRisk requirements for ICT services. DORA additionally requires: An ICT third-party register (Register of Information), stricter requirements for ICT providers with critical functions, incident reporting within

4 hours for major ICT incidents, regular Threat-Led Penetration Tests (TLPT) and exit strategies for critical ICT outsourcings. Institutions must extend their outsourcing policy with DORA-specific provisions and manage the parallel governance of MaRisk outsourcings and DORA ICT third-party arrangements.

What must be documented in the outsourcing register?

The outsourcing register is a mandatory document under MaRisk AT 9. It must contain: Description of the outsourced activity and its criticality classification, name and location of the outsourcing provider, contract duration and termination periods, risk analysis results, information on sub-outsourcing arrangements, assignment to the responsible outsourcing officer. Since the 6th MaRisk amendment, the register must cover both material and non-material outsourcings and be kept up to date. For ICT outsourcings, DORA additionally requires a separate Register of Information.

How does ADVISORI support outsourcing policy development?

ADVISORI supports banks and financial institutions in developing and implementing a MaRisk-compliant outsourcing policy: Gap analysis of the existing policy against MaRisk AT 9, KWG 25b, EBA Guidelines and DORA requirements, drafting or revision of the outsourcing policy with practical materiality criteria, setup of the outsourcing register and BaFin notification processes, implementation of governance structures and monitoring processes, training of relevant departments and alignment with internal audit. Our approach combines regulatory compliance with operational efficiency.

Success Stories

Discover how we support companies in their digital transformation

Digitalization in Steel Trading

Klöckner & Co

Digital Transformation in Steel Trading

Case Study
Digitalisierung im Stahlhandel - Klöckner & Co

Results

Over 2 billion euros in annual revenue through digital channels
Goal to achieve 60% of revenue online by 2022
Improved customer satisfaction through automated processes

AI-Powered Manufacturing Optimization

Siemens

Smart Manufacturing Solutions for Maximum Value Creation

Case Study
Case study image for AI-Powered Manufacturing Optimization

Results

Significant increase in production performance
Reduction of downtime and production costs
Improved sustainability through more efficient resource utilization

AI Automation in Production

Festo

Intelligent Networking for Future-Proof Production Systems

Case Study
FESTO AI Case Study

Results

Improved production speed and flexibility
Reduced manufacturing costs through more efficient resource utilization
Increased customer satisfaction through personalized products

Generative AI in Manufacturing

Bosch

AI Process Optimization for Improved Production Efficiency

Case Study
BOSCH KI-Prozessoptimierung für bessere Produktionseffizienz

Results

Reduction of AI application implementation time to just a few weeks
Improvement in product quality through early defect detection
Increased manufacturing efficiency through reduced downtime

Let's

Work Together!

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

Ready for the next step?

Schedule a strategic consultation with our experts now

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

Your strategic goals and challenges
Desired business outcomes and ROI expectations
Current compliance and risk situation
Stakeholders and decision-makers in the project

Prefer direct contact?

Direct hotline for decision-makers

Strategic inquiries via email

Detailed Project Inquiry

For complex inquiries or if you want to provide specific information in advance

Latest Insights on Outsourcing Policy

Discover our latest articles, expert knowledge and practical guides about Outsourcing Policy

Cyber Insurance: Requirements, Costs, and Selection Guide for Businesses 2026
Informationssicherheit

Cyber Insurance: Requirements, Costs, and Selection Guide for Businesses 2026

April 17, 2026
12 min

Cyber insurance covers financial losses from cyberattacks, data breaches, and IT outages. This guide explains what insurers require in 2026, coverage types, costs by company size, and how to choose the right policy — including how ISO 27001 certification reduces premiums.

Boris Friedrich
Read
Vulnerability Management: The Complete Lifecycle for Finding, Prioritizing, and Remediating Weaknesses
Informationssicherheit

Vulnerability Management: The Complete Lifecycle for Finding, Prioritizing, and Remediating Weaknesses

April 16, 2026
14 min

Over 30,000 CVEs are published annually. Effective vulnerability management prioritizes what matters most to your organization and remediates before attackers exploit. This guide covers the full lifecycle: discovery, scanning, risk-based prioritization, remediation, and compliance.

Boris Friedrich
Read
Security Awareness Training: Building Effective Programs and Measuring Impact
Informationssicherheit

Security Awareness Training: Building Effective Programs and Measuring Impact

April 15, 2026
12 min

The human layer remains the weakest link in cybersecurity. This guide covers how to build an effective security awareness program, run phishing simulations, design role-based training, and measure whether your program actually reduces risk — with benchmarks and KPIs.

Boris Friedrich
Read
Penetration Testing: Methods, Process & Provider Selection Guide 2026
Informationssicherheit

Penetration Testing: Methods, Process & Provider Selection Guide 2026

April 15, 2026
14 min

Penetration testing reveals vulnerabilities before attackers exploit them. This comprehensive guide covers black box, grey box, and white box methods, the 5-phase pentest process, provider selection criteria, DORA TLPT requirements, and cost benchmarks for every test type.

Boris Friedrich
Read
Business Continuity Software: Comparing Leading BCM Platforms 2026
Informationssicherheit

Business Continuity Software: Comparing Leading BCM Platforms 2026

April 14, 2026
18 min

Business continuity software automates BIA, plan management, exercise tracking, and incident response. This comparison reviews leading BCM platforms, selection criteria, DORA alignment, and which solution fits organizations at different maturity levels.

Boris Friedrich
Read
SOC 2 vs. ISO 27001: Which Security Certification Do You Need?
Informationssicherheit

SOC 2 vs. ISO 27001: Which Security Certification Do You Need?

April 14, 2026
16 min

SOC 2 and ISO 27001 are the most requested security certifications. This practical comparison covers scope, cost, timeline, customer expectations, regulatory alignment, and the 70% control overlap — helping you decide which to pursue (or whether you need both).

Boris Friedrich
Read
View All Articles
ADVISORI Logo
BlogCase StudiesAbout Us
info@advisori.de+49 69 913 113-01