Institutions should identify and require information security controls that specifically address external parties (contractors, service providers) gaining authorized access to the organization's information in a policy. The controls should also specify processes and procedures that should be followed, either when third party contractors work within the organization or when there are service provider/hosting arrangements.