Organizational risk tolerance is determined and clearly expressed
Organizational risk tolerance is determined and clearly expressed
The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis
Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders
Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process
Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan.
Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.
Response and recovery planning and testing are conducted with suppliers and third-party providers
Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes
Physical access to assets is managed and protected
Remote access is managed