Skip to main content

πŸ’Ό GV.SC-05: Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties

  • Contextual name: πŸ’Ό GV.SC-05: Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties
  • ID: /frameworks/nist-csf-v2.0/gv-sc/05
  • Located in: πŸ’Ό Cybersecurity Supply Chain Risk Management (GV.SC)

Description​

  1. Establish security requirements for suppliers, products, and services commensurate with their criticality level and potential impact if compromised
  2. Include all cybersecurity and supply chain requirements that third parties must follow and how compliance with the requirements may be verified in default contractual language
  3. Define the rules and protocols for information sharing between the organization and its suppliers and sub-tier suppliers in agreements
  4. Manage risk by including security requirements in agreements based on their criticality and potential impact if compromised
  5. Define security requirements in service-level agreements (SLAs) for monitoring suppliers for acceptable security performance throughout the supplier relationship lifecycle
  6. Contractually require suppliers to disclose cybersecurity features, functions, and vulnerabilities of their products and services for the life of the product or the term of service
  7. Contractually require suppliers to provide and maintain a current component inventory (e.g., software or hardware bill of materials) for critical products
  8. Contractually require suppliers to vet their employees and guard against insider threats
  9. Contractually require suppliers to provide evidence of performing acceptable security practices through, for example, self-attestation, conformance to known standards, certifications, or inspections
  10. Specify in contracts and other agreements the rights and responsibilities of the organization, its suppliers, and their supply chains, with respect to potential cybersecurity risks

Similar​

  • Sections
    • /frameworks/nist-csf-v1.1/id-sc/03
    • /frameworks/nist-sp-800-53-r5/sa/04
    • /frameworks/nist-sp-800-53-r5/sa/09
    • /frameworks/nist-sp-800-53-r5/sr/03
    • /frameworks/nist-sp-800-53-r5/sr/05
    • /frameworks/nist-sp-800-53-r5/sr/06
    • /frameworks/nist-sp-800-53-r5/sr/10

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό ID.SC-3: Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization's cybersecurity program and Cyber Supply Chain Risk Management Plan
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SA-4 Acquisition Process12
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SA-9 External System Services811
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SR-3 Supply Chain Controls and Processes3
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SR-5 Acquisition Strategies, Tools, and Methods2
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SR-6 Supplier Assessments and Reviews1
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SR-10 Inspection of Systems or Components

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags