πΌ SR-2 Supply Chain Risk Management Plan
Descriptionβ
a. Develop a plan for managing supply chain risks associated with the research and development, design, manufacturing, acquisition, delivery, integration, operations and maintenance, and disposal of the following systems, system components or system services: [Assignment: organization-defined systems, system components, or system services];
b. Review and update the supply chain risk management plan [Assignment: organization-defined frequency] or as required, to address threat, organizational or environmental changes; and
c. Protect the supply chain risk management plan from unauthorized disclosure and modification.
Similarβ
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
πΌ FedRAMP High Security Controls β πΌ SR-2 Supply Chain Risk Management Plan (L)(M)(H) | 1 | | | |
πΌ FedRAMP Low Security Controls β πΌ SR-2 Supply Chain Risk Management Plan (L)(M)(H) | 1 | | | |
πΌ NIST CSF v2.0 β πΌ GV.RM-01: Risk management objectives are established and agreed to by organizational stakeholders | | | | |
πΌ NIST CSF v2.0 β πΌ GV.RM-03: Cybersecurity risk management activities and outcomes are included in enterprise risk management processes | | | | |
πΌ NIST CSF v2.0 β πΌ GV.RM-04: Strategic direction that describes appropriate risk response options is established and communicated | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-01: A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-02: Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-03: Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes | | | 7 | |
πΌ NIST CSF v2.0 β πΌ GV.SC-08: Relevant suppliers and other third parties are included in incident planning, response, and recovery activities | | | 1 | |
πΌ NIST CSF v2.0 β πΌ GV.SC-09: Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-10: Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement | | | | |
πΌ NIST CSF v2.0 β πΌ ID.AM-04: Inventories of services provided by suppliers are maintained | | | | |
πΌ NIST CSF v2.0 β πΌ ID.IM-04: Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved | | | 3 | |
Sub Sectionsβ