supply-chain

supply-chain Controls

17 controls across 3 frameworks.

CISA CPG

NIST CSF

de-cm-6

External service provider activities and services are monitored to detect potentially adverse events

Detect / Continuous Monitoring

gv-sc-1

A cybersecurity supply chain risk management program is established

Govern / Cybersecurity Supply Chain Risk Management

gv-sc-10

Supply chain risk management plans include provisions for activities after a supplier relationship ends

Govern / Cybersecurity Supply Chain Risk Management

gv-sc-2

Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated

Govern / Cybersecurity Supply Chain Risk Management

gv-sc-3

Supply chain risk management is integrated into enterprise risk management processes

Govern / Cybersecurity Supply Chain Risk Management

gv-sc-4

Suppliers are known and prioritized by criticality

Govern / Cybersecurity Supply Chain Risk Management

gv-sc-5

Cybersecurity requirements are integrated into contracts with suppliers

Govern / Cybersecurity Supply Chain Risk Management

gv-sc-6

Due diligence is performed before entering into supplier relationships

Govern / Cybersecurity Supply Chain Risk Management

gv-sc-7

Risks from suppliers are assessed, monitored, and responded to throughout the relationship

Govern / Cybersecurity Supply Chain Risk Management

gv-sc-8

Relevant suppliers are included in incident planning, response, and recovery activities

Govern / Cybersecurity Supply Chain Risk Management

gv-sc-9

Supply chain security practices are monitored throughout the technology product and service life cycle

Govern / Cybersecurity Supply Chain Risk Management

id-ra-10

Critical suppliers are assessed prior to acquisition

Identify / Risk Assessment

id-ra-9

The authenticity and integrity of hardware and software are assessed prior to acquisition and use

Identify / Risk Assessment

SOC2