This is a dedicated watch page for a single video.
Chloe is evaluating a new third-party vendor that will provide authentication services for a financial institution. To ensure the vendor meets security requirements, she reviews their compliance with ISO/IEC 27001 and SOC 2, assesses their incident response capabilities, and verifies their security certifications. Which supply chain management practice is MOST LIKELY being performed?