This is a potential security issue, you are being redirected to https://csrc.nist.gov.
Date Published: April 2021
Comments Due: June 25, 2021 (public comment period is CLOSED)
Email Questions to: email@example.com
Planning Note (6/7/2021):
The due date for submitting comments has been extended to June 25, 2021 (it was originally June 14, 2021).
, , , , ,
More than ever, organizations are concerned about the risks associated with products and services that may contain potentially malicious functionality, are counterfeit, or are vulnerable due to poor manufacturing and development practices within the cyber supply chain. These risks can decrease an enterprise’s visibility into and understanding of how the technology that they acquire is developed, integrated, and deployed. They can also affect and be affected by the processes, procedures, and practices used to ensure the security, resilience, reliability, safety, integrity, and quality of products and services.
That is why NIST is inviting comments on a major revision to Cyber Supply Chain Risk Management Practices for Systems and Organizations (SP 800-161). The updates are designed to better help organizations identify, assess, and respond to cyber supply chain risks while still aligning with other fundamental NIST cybersecurity risk management guidance.
The revision to this foundational NIST publication represents a 1-year effort to incorporate next generation cyber supply chain risk management (C-SCRM) controls, strategies, policies, plans, and risk assessments into broader enterprise risk management activities by applying a multi-level approach. The changes focus on making implementation guidance more modular and consumable for acquirers, suppliers, developers, system integrators, external system service providers, and other information and communications technology (ICT)/operational technology (OT)-related service providers. Additionally, the references have been updated and expanded.
Based on comments received by
June 14 June 25, 2021, NIST anticipates releasing a second draft in September 2021 and a final version by April 2022. NIST is especially interested in feedback on whether the document provides guidance and a structure that any organization can use, regardless of size or mission, and that is still sufficiently descriptive to be clear and actionable.
We ask you to consider using the comment template to record and submit your comments.
NIST held a virtual workshop on May 12, 2021, to further engage stakeholders by answering questions and gathering comments to ensure that the revised guidance will deliver comprehensive and relevant cyber supply chain risk management practices and guidance.
For details, visit the workshop homepage.
Also see information about NIST’s Cyber Supply Chain Risk Management Program.
SP 800-161 Rev. 1 (Draft) (DOI)
Comment template (xls)
NIST’s Cyber Supply Chain Risk Management Program (other)
Related NIST Publications:
02/04/20: SP 800-161 Rev. 1 (Draft)
04/29/21: SP 800-161 Rev. 1 (Draft)
10/28/21: SP 800-161 Rev. 1 (Draft)
05/05/22: SP 800-161 Rev. 1 (Final)
Security and Privacy
cybersecurity supply chain risk management