ID.RA-09.175
Does your organization have a formal process to assess the authenticity and security posture of critical technology products and services before acquisition and deployment?
Explanation
This question evaluates whether your organization conducts proper security due diligence before integrating new technology into your environment. Such assessments should include verification of vendor credentials, security certifications, vulnerability testing results, and supply chain integrity to prevent the introduction of compromised or insecure components. Evidence could include a documented vendor security assessment procedure, completed security questionnaires for recent technology acquisitions, records of security certification verification, or reports from third-party security assessments of products prior to purchase decisions.
Implementation Example
Assess the authenticity and cybersecurity of critical technology products and services prior to acquisition and use
ID: ID.RA-09.175
Context
- Function
- ID: IDENTIFY
- Category
- ID.RA: Risk Assessment
- Sub-Category
- The authenticity and integrity of hardware and software are assessed prior to acquisition and use

