GV.SC-05.084
Has your organization established security requirements for suppliers, products, and services based on their criticality level and potential impact?
Explanation
This question assesses whether your organization has a structured approach to managing supply chain security risks by defining requirements proportional to the criticality of each supplier, product, or service. For example, a cloud provider hosting sensitive data would have more stringent security requirements than an office supply vendor. Similarly, critical software components would require more thorough security assessments than non-critical tools. Evidence could include a supplier security policy document, a tiered classification of suppliers with corresponding security requirements, security questionnaires tailored by criticality level, or contractual language templates that incorporate security requirements based on risk assessment outcomes.
Implementation Example
Establish security requirements for suppliers, products, and services commensurate with their criticality level and potential impact if compromised
ID: GV.SC-05.084
Context
- Function
- GV: GOVERN
- Category
- GV.SC: Cybersecurity Supply Chain Risk Management
- Sub-Category
- Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties

