GV.SC-09.110
Does your organization have a documented process for ensuring that software patches, updates, and upgrades are acquired only from authenticated and trustworthy sources?
Explanation
This question assesses whether your organization has formal procedures to verify the authenticity of software sources before implementing patches or updates. Without proper verification, organizations risk installing compromised software that could contain malware or backdoors, potentially leading to data breaches or system compromise. Evidence could include a documented software update policy, vendor verification procedures, digital signature verification protocols, or change management documentation that specifically addresses source verification steps before software updates are approved for installation.
Implementation Example
Communicate regularly among cybersecurity risk managers and operations personnel about the need to acquire software patches, updates, and upgrades only from authenticated and trustworthy software providers
ID: GV.SC-09.110
Context
- Function
- GV: GOVERN
- Category
- GV.SC: Cybersecurity Supply Chain Risk Management
- Sub-Category
- Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle

