13.04.2015 Views

NIST.SP.800-161

NIST.SP.800-161

NIST.SP.800-161

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Special Publication 800-<strong>161</strong><br />

Supply Chain Risk Management Practices for Federal<br />

Information Systems and Organizations<br />

________________________________________________________________________________________________________<br />

3.3.2 Suppliers .......................................................................................................................................... 51<br />

3.3.3 External Providers of Information System Services ......................................................................... 52<br />

3.4 SELECTING AND TAILORING IMPLEMENTING ICT SCRM SECURITY CONTROLS ............................................ 52<br />

3.4.1 ICT SCRM Control Format ................................................................................................................ 52<br />

3.4.2 Using ICT SCRM Controls in This Publication ................................................................................... 53<br />

3.5 ICT SCRM SECURITY CONTROLS ................................................................................................................... 55<br />

FAMILY: ACCESS CONTROL .......................................................................................................................... 55<br />

FAMILY: AWARENESS AND TRAINING ......................................................................................................... 60<br />

FAMILY: AUDIT AND ACCOUNTABILITY ....................................................................................................... 62<br />

FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION ............................................................................. 65<br />

FAMILY: CONFIGURATION MANAGEMENT ................................................................................................. 68<br />

FAMILY: CONTINGENCY PLANNING ............................................................................................................. 74<br />

FAMILY: IDENTIFICATION AND AUTHENTICATION ...................................................................................... 77<br />

FAMILY: INCIDENT RESPONSE ...................................................................................................................... 79<br />

FAMILY: MAINTENANCE .............................................................................................................................. 81<br />

FAMILY: MEDIA PROTECTION ...................................................................................................................... 85<br />

FAMILY: PHYSICAL AND ENVIRONMENTAL PROTECTION ............................................................................ 86<br />

FAMILY: PLANNING ...................................................................................................................................... 88<br />

FAMILY: PROGRAM MANAGEMENT ............................................................................................................ 90<br />

FAMILY: PERSONNEL SECURITY ................................................................................................................... 92<br />

FAMILY: PROVENANCE ................................................................................................................................ 94<br />

FAMILY: RISK ASSESSMENT .......................................................................................................................... 97<br />

FAMILY: SYSTEM AND SERVICES ACQUISITION ............................................................................................ 98<br />

FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION ......................................................................... 110<br />

FAMILY: SYSTEM AND INFORMATION INTEGRITY ..................................................................................... 115<br />

ICT SCRM CONTROL SUMMARY ............................................................................................................................. 1<br />

<strong>NIST</strong> SP 800-53 ICT SCRM-RELEVANT CONTROLS .................................................................................................... 1<br />

FAMILY: ACCESS CONTROL ............................................................................................................................ 1<br />

FAMILY: AWARENESS AND TRAINING ......................................................................................................... 12<br />

FAMILY: AUDIT AND ACCOUNTABILITY ....................................................................................................... 14<br />

FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION ............................................................................. 19<br />

FAMILY: CONFIGURATION MANAGEMENT ................................................................................................. 25<br />

FAMILY: CONTINGENCY PLANNING ............................................................................................................. 35<br />

FAMILY: IDENTIFICATION AND AUTHENTICATION ...................................................................................... 40<br />

FAMILY: INCIDENT RESPONSE ...................................................................................................................... 44<br />

FAMILY: MAINTENANCE .............................................................................................................................. 47<br />

FAMILY: MEDIA PROTECTION ...................................................................................................................... 52<br />

FAMILY: PHYSICAL AND ENVIRONMENTAL PROTECTION ............................................................................ 54<br />

FAMILY: PLANNING ...................................................................................................................................... 58<br />

FAMILY: PROGRAM MANAGEMENT ............................................................................................................ 61<br />

FAMILY: PERSONNEL SECURITY ................................................................................................................... 64<br />

FAMILY: RISK ASSESSMENT .......................................................................................................................... 66<br />

FAMILY: SYSTEM AND SERVICES ACQUISITION ............................................................................................ 69<br />

FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION ........................................................................... 88<br />

FAMILY: SYSTEM AND INFORMATION INTEGRITY ....................................................................................... 96<br />

ICT SUPPLY CHAIN THREAT EVENTS ....................................................................................................................... 1<br />

SUPPLY CHAIN THREAT SCENARIOS AND ANALYSIS FRAMEWORK ......................................................................... 1<br />

Page v

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!