It depends on the size of the business. In my experience, most of the publicly listed companies' procurement team will have this requirement as part of due diligence of vendor onboarding process.
For private companies, it depends on the size and agility of the business that matters the most.
Another driver for this requirement comes from regulatory compliance side and that too depends on which sector the company is operating.
Content you might like
We implemented Oracle HCM recently including Redwood. Defining the long term plan for support, we face challenges with our Oracle Security knowledge depth specifically (defining and maintaining roles/ SOD/ SOX etc). Is there anyone who has experience in setting this up after a successful Oracle HCM plus Redwood implementation and would like to share best practices with me?
I'm looking for an open-source IGA solution, has anyone had any experience they can share?
Are CISA's current recommendations for preventing Maui ransomware attacks sufficient?
It depends on the size of the business. In my experience, most of the publicly listed companies' procurement team will have this requirement as part of due diligence of vendor onboarding process.
For private companies, it depends on the size and agility of the business that matters the most.
Another driver for this requirement comes from regulatory compliance side and that too depends on which sector the company is operating.