U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.


We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

ICT Supply Chain Compromise


  An ICT supply chain compromise is an occurrence within the ICT supply chain whereby an adversary jeopardizes the confidentiality, integrity, or availability of a system or the information the system processes, stores, or transmits. An ICT supply chain compromise can occur anywhere within the system development life cycle of the product or service. NOTE:  System includes physical or electronic system or network of organizations, people, technology, activities, information, and resources. It also includes system or network components. In the context of ICT supply chain, system encompasses both the system that traverses the supply chain and the organization’s ICT supply chain infrastructure. NOTE: ICT supply chain is a system transforming natural resources, raw materials, and components into a finished ICT product or service from supplier to the end customer. NOTE: Development life cycle in general includes design, manufacturing, production, distribution, acquisition, installation, operations, maintenance, and decommissioning.
NIST SP 800-161