Piloting Supply Chain Risk Management Practices for Federal Information Systems

720 KB | 3 files |  PDF, DOC

Your supply chain is one of the most critical-and vulnerable-data pipelines for your organization. This policy document is a starting point for a broader initiative to lock down your supply chain to outside and inside threats.

Supply chain attacks may involve manipulating computing system hardware, software or services at any point during the life cycle. Supply chain attacks are typically conducted or facilitated by individuals or organizations that have access through commercial ties, leading to stolen critical data and technology, corruption of the system/infrastructure and/or disabling of mission-critical operations.

Organizations must assess and manage supply chain risks to ensure mission success. The goal of this document is to help manage these supply chain risks by providing organizations with a defense-in-breadth toolset of supply chain assurance programmatic activities that the organization implements as well as general and technical requirements that the organization can place in contractual documents. This document represents a component of a broader supply chain risk management strategy that includes a variety of policies, standards, regulatory changes and implementation frameworks.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.doc
  • Piloting Supply Chain Risk Management Practices for Federal Information Systems.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

All IT Downloads from National Institute of Standards and Technology» | Visit National Institute of Standards and Technology »
Related IT Downloads

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ...  More >>

Analytics7 Big Data: Storage, Sharing, and Security

Chapter 2 focuses on answering questions faced by individuals interested in using storage or database technologies to solve their Big Data problems. ...  More >>

Misc64 Microsoft PowerPoint 2016 Quick Reference

This Microsoft PowerPoint 2016 Quick Reference covers the basics screen layout, fundamentals of using the program and working with slides, keyboard shortcuts, formatting, transitions and working with images and multimedia files. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.