πΌ SR-3 Supply Chain Controls and Processes
Descriptionβ
a. Establish a process or processes to identify and address weaknesses or deficiencies in the supply chain elements and processes of [Assignment: organization-defined system or system component] in coordination with [Assignment: organization-defined supply chain personnel];
b. Employ the following controls to protect against supply chain risks to the system, system component, or system service and to limit the harm or consequences from supply chain-related events: [Assignment: organization-defined supply chain controls]; and
c. Document the selected and implemented supply chain processes and controls in [Selection: security and privacy plans; supply chain risk management plan; [Assignment: organization-defined document]].
Similarβ
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
πΌ FedRAMP High Security Controls β πΌ SR-3 Supply Chain Controls and Processes (L)(M)(H) | | | | |
πΌ FedRAMP Low Security Controls β πΌ SR-3 Supply Chain Controls and Processes (L)(M)(H) | | | | |
πΌ NIST CSF v2.0 β πΌ GV.OC-02: Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered | | | 7 | |
πΌ NIST CSF v2.0 β πΌ GV.SC-01: A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-02: Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-03: Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes | | | 7 | |
πΌ NIST CSF v2.0 β πΌ GV.SC-05: Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-07: The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship | | | 26 | |
πΌ NIST CSF v2.0 β πΌ GV.SC-08: Relevant suppliers and other third parties are included in incident planning, response, and recovery activities | | | 1 | |
πΌ NIST CSF v2.0 β πΌ GV.SC-09: Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-10: Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement | | | | |
πΌ NIST CSF v2.0 β πΌ RS.CO-02: Internal and external stakeholders are notified of incidents | | | 30 | |
πΌ NIST CSF v2.0 β πΌ RS.CO-03: Information is shared with designated internal and external stakeholders | | | 17 | |
πΌ NIST CSF v2.0 β πΌ RS.MA-01: The incident response plan is executed in coordination with relevant third parties once an incident is declared | | | | |
Sub Sectionsβ