Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

ITL Bulletin June 2015

Increasing Visibility and Control of Your ICT Supply Chains

Date Published: June 2015

Author(s)

Jon Boyens (NIST), Celia Paulsen (NIST), Larry Feldman (G2), Gregory Witte (G2)

Abstract

Keywords

acquisition; Information and Communication Technology (ICT); risk management; supply chain assurance; supply chain risk; supply chain risk assessment; Supply Chain Risk Management (SCRM); supply chain security
Control Families

Access Control; Audit and Accountability; Awareness and Training; Security Assessment and Authorization; Configuration Management; Contingency Planning; Identification and Authentication; Incident Response; Maintenance; Media Protection; Personnel Security; Physical and Environmental Protection; Planning; Program Management; Risk Assessment; System and Communications Protection; System and Information Integrity; System and Services Acquisition;

Documentation

Publication:
June 2015 ITL Bulletin

Supplemental Material:
None available

Topics

Security and Privacy
acquisition; incident response; maintenance; planning; risk assessment

Applications
supply chain