Skip to main content

πŸ’Ό SA-12 SUPPLY CHAIN PROTECTION

Description​

The organization protects against supply chain threats to the information system, system component, or information system service by employing [Assignment: organization-defined security safeguards] as part of a comprehensive, defense-in-breadth information security strategy.

Similar​

  • Internal
    • ID: dec-c-de28a060

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό ID.BE-1: The organization's role in the supply chain is identified and communicated
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό ID.SC-1: Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό ID.SC-2: Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process77
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό ID.SC-3: Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization's cybersecurity program and Cyber Supply Chain Risk Management Plan
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations1619
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.IP-2: A System Development Life Cycle to manage systems is implemented66

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό SA-12 (1) ACQUISITION STRATEGIES _ TOOLS _ METHODS
πŸ’Ό SA-12 (2) SUPPLIER REVIEWS
πŸ’Ό SA-12 (3) TRUSTED SHIPPING AND WAREHOUSING
πŸ’Ό SA-12 (4) DIVERSITY OF SUPPLIERS
πŸ’Ό SA-12 (5) LIMITATION OF HARM
πŸ’Ό SA-12 (6) MINIMIZING PROCUREMENT TIME
πŸ’Ό SA-12 (7) ASSESSMENTS PRIOR TO SELECTION _ ACCEPTANCE _ UPDATE
πŸ’Ό SA-12 (8) USE OF ALL-SOURCE INTELLIGENCE
πŸ’Ό SA-12 (9) OPERATIONS SECURITY
πŸ’Ό SA-12 (10) VALIDATE AS GENUINE AND NOT ALTERED
πŸ’Ό SA-12 (11) PENETRATION TESTING _ ANALYSIS OF ELEMENTS, PROCESSES, AND ACTORS
πŸ’Ό SA-12 (12) INTER-ORGANIZATIONAL AGREEMENTS
πŸ’Ό SA-12 (13) CRITICAL INFORMATION SYSTEM COMPONENTS
πŸ’Ό SA-12 (14) IDENTITY AND TRACEABILITY
πŸ’Ό SA-12 (15) PROCESSES TO ADDRESS WEAKNESSES OR DEFICIENCIES