Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

This is an archive
(replace .gov by .rip)

ITL Bulletin June 2015

Increasing Visibility and Control of Your ICT Supply Chains

Date Published: June 2015

Author(s)

Jon Boyens (NIST), Celia Paulsen (NIST), Larry Feldman (G2), Gregory Witte (G2)

Abstract

Keywords

acquisition; Information and Communication Technology (ICT); risk management; supply chain assurance; supply chain risk; supply chain risk assessment; Supply Chain Risk Management (SCRM); supply chain security
Control Families

Access Control; Audit and Accountability; Awareness and Training; Security Assessment and Authorization; Configuration Management; Contingency Planning; Identification and Authentication; Incident Response; Maintenance; Media Protection; Personnel Security; Physical and Environmental Protection; Planning; Program Management; Risk Assessment; System and Communications Protection; System and Information Integrity; System and Services Acquisition;

Documentation

Publication:
June 2015 ITL Bulletin

Supplemental Material:
None available

Topics

Security and Privacy
acquisition; incident response; maintenance; planning; risk assessment

Applications
supply chain