Which of the following is the MOST critical security consideration when an enterprise outsource its major part of IT department…?