Section 3(3)(i) in The Information Technology (Information Security Practices and Procedures for Protected System) Rules, 2018
(i)plan, develop, maintain and review documented process for IT Security Service Level Agreements (SLAs). The same shall be strictly followed while designing the Service Level Agreements with service providers;