💼 NIST CSF v1.1 → 💼 ID.GV-2: Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners | | | | |
💼 NIST CSF v1.1 → 💼 ID.SC-2: Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process | | 7 | 7 | |
💼 NIST SP 800-53 Revision 5 → 💼 PM-9 Risk Management Strategy | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 PM-18 Privacy Program Plan | | | | |
💼 NIST SP 800-53 Revision 5 → 💼 PM-30 Supply Chain Risk Management Strategy | 1 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 SR-3 Supply Chain Controls and Processes | 3 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 SR-5 Acquisition Strategies, Tools, and Methods | 2 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 SR-6 Supplier Assessments and Reviews | 1 | | | |
💼 NIST SP 800-53 Revision 5 → 💼 SR-8 Notification Agreements | | | | |