13.04.2015 Views

NIST.SP.800-161

NIST.SP.800-161

NIST.SP.800-161

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Special Publication 800-<strong>161</strong><br />

Supply Chain Risk Management Practices for Federal<br />

Information Systems and Organizations<br />

________________________________________________________________________________________________________<br />

Figure 1-1: Four Pillars of ICT SCRM<br />

1.4.1 Federal Agencies ICT Supply Chain<br />

Federal agencies run complex information systems and networks to support their missions. These<br />

information systems and networks are composed of ICT products and components made available by ICT<br />

suppliers. Federal agencies also acquire and deploy an array of IT services, including those that:<br />

<br />

<br />

Integrate or provide operations, maintenance, and disposal support for federal information<br />

systems and networks within and outside of the federal agency authorization boundaries, 4 made<br />

available by system integrators; and<br />

Provide external services to support federal agency operations that are provided from both within<br />

or outside of the federal agency authorization boundaries, made available by external service<br />

providers.<br />

In addition to operating information systems and networks internally, organizations also host system<br />

development and integration activities within their authorization boundaries. Those activities may be<br />

performed by the agency themselves or by system integrators. The ICT supply chain infrastructure is the<br />

integrated set of components (hardware, software, and processes) within the organizational boundary that<br />

4<br />

<strong>NIST</strong> SP 800-53 Rev. 4 defines Authorization Boundary as:<br />

All components of an information system to be authorized for operation by an authorizing official and excludes<br />

separately authorized systems, to which the information system is connected.[<strong>NIST</strong> SP 800-53 Rev. 4, p. B-2]<br />

CHAPTER 1 PAGE 4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!