| 💼 SA-12(1) Supply Chain Protection _ Acquisition Strategies / Tools / Methods | | | | | no data |
| 💼 SA-12(2) Supply Chain Protection _ Supplier Reviews | | | | | no data |
| 💼 SA-12(3) Supply Chain Protection _ Trusted Shipping and Warehousing | | | | | no data |
| 💼 SA-12(4) Supply Chain Protection _ Diversity of Suppliers | | | | | no data |
| 💼 SA-12(5) Supply Chain Protection _ Limitation of Harm | | | | | no data |
| 💼 SA-12(6) Supply Chain Protection _ Minimizing Procurement Time | | | | | no data |
| 💼 SA-12(7) Supply Chain Protection _ Assessments Prior to Selection / Acceptance / Update | | | | | no data |
| 💼 SA-12(8) Supply Chain Protection _ Use of All-source Intelligence | | | | | no data |
| 💼 SA-12(9) Supply Chain Protection _ Operations Security | | | | | no data |
| 💼 SA-12(10) Supply Chain Protection _ Validate as Genuine and Not Altered | | | | | no data |
| 💼 SA-12(11) Supply Chain Protection _ Penetration Testing / Analysis of Elements, Processes, and Actors | | | | | no data |
| 💼 SA-12(12) Supply Chain Protection _ Inter-organizational Agreements | | | | | no data |
| 💼 SA-12(13) Supply Chain Protection _ Critical Information System Components | | | | | no data |
| 💼 SA-12(14) Supply Chain Protection _ Identity and Traceability | | | | | no data |
| 💼 SA-12(15) Supply Chain Protection _ Processes to Address Weaknesses or Deficiencies | | | | | no data |