13.04.2015 Views

NIST.SP.800-161

NIST.SP.800-161

NIST.SP.800-161

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Special Publication 800-<strong>161</strong><br />

Supply Chain Risk Management Practices for Federal<br />

Information Systems and Organizations<br />

________________________________________________________________________________________________________<br />

1.7.2 Enhanced ICT SCRM Overlay<br />

This publication contains an enhanced overlay of [<strong>NIST</strong> SP 800-53 Rev. 4]. Chapter 3 identifies, refines,<br />

and expands ICT SCRM-related controls from [<strong>NIST</strong> SP 800-53 Rev. 4], adds new controls that address<br />

specific ICT SCRM concerns, and offers ICT SCRM-specific supplemental guidance where appropriate.<br />

Figure 1-5 illustrates the process used to create the enhanced overlay. The individual controls and<br />

enhancements from [<strong>NIST</strong> SP 800-53 Rev. 4] that were relevant to ICT SCRM were extracted. These<br />

controls were analyzed to determine how they apply to ICT SCRM. Additional supplemental guidance<br />

was then developed and included for each control and control enhancement. The resulting set of controls<br />

and enhancements were evaluated to determine whether all ICT SCRM concerns were addressed. A new<br />

control family, Provenance, and some additional controls and control enhancements were created to<br />

address specific remaining ICT SCRM concerns.<br />

Figure 1-5: ICT SCRM Security Controls in <strong>NIST</strong> SP 800-<strong>161</strong>, Chapter 3.5<br />

Managing Cost and Resources<br />

Organizations should be aware that implementing these controls will require financial and human<br />

resources. Any requirements that result from federal agencies implementing these controls may also<br />

require financial and human resources from their system integrators, suppliers, and external service<br />

providers potentially resulting in increased costs to the federal acquirers. The acquirers should be<br />

cognizant of the costs and weigh them against the risks to the organization of not selecting ICT SCRM<br />

controls. When appropriate, allow system integrators, suppliers, and external services providers the<br />

opportunity to reuse any existing data and documentation that may provide evidence to support ICT<br />

SCRM. The challenge of balancing ICT supply chain risks with the costs and benefits of mitigating<br />

controls should be a key component of the acquirer’s overall approach to ICT SCRM.<br />

1.8 ORGANIZATION OF THIS SPECIAL PUBLICATION<br />

This publication is organized as follows:<br />

Chapter 1 provides the purpose, scope, and applicability of the publication and describes<br />

foundational concepts and practices;<br />

CHAPTER 1 PAGE 14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!