GV.SC-09.109
Does your organization provide regular risk reporting to leadership regarding the authenticity and integrity of acquired components?
Explanation
This question assesses whether your organization has a formal process to verify and report on the authenticity of components (hardware, software, services) acquired from third parties, and communicates these findings to leadership. Supply chain attacks often target organizations through compromised components, making verification and leadership awareness critical security controls. Evidence could include quarterly or monthly reports to leadership that document component verification activities, findings from integrity checks, summaries of vendor security assessments, or dashboards showing supply chain risk metrics with authenticity verification results.
Implementation Example
Periodically provide risk reporting to leaders about how acquired components are proven to be untampered and authentic
ID: GV.SC-09.109
Context
- Function
- GV: GOVERN
- Category
- GV.SC: Cybersecurity Supply Chain Risk Management
- Sub-Category
- Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle

