Technology Development & Acquisition

Mechanisms exist to publish integrity verification information for software releases.


Login

Technology Development & Acquisition

Mechanisms exist to archive software releases and all of their components (e.g., code, package files, third-party libraries, documentation) to maintain integrity verification information.


Login

Technology Development & Acquisition

Level N/A

Mechanisms exist to escrow source code and supporting documentation to ensure software availability in the event the software provider goes out of business or is unable to provide support.


Login

Third-Party Management

Mechanisms exist to facilitate the implementation of third-party management controls.


Login

Third-Party Management

Mechanisms exist to maintain a current, accurate and complete list of External Service Providers (ESPs) that can potentially impact the Confidentiality, Integrity, Availability and/or Safety (CIAS) of the organization's systems, applications, services and data.


Login

Third-Party Management

Mechanisms exist to identify, prioritize and assess suppliers and partners of critical systems, components and services using a supply chain risk assessment process relative to their importance in supporting the delivery of high-value services.


Login

Third-Party Management

Mechanisms exist to evaluate security risks associated with the services and product supply chain.


Login

Third-Party Management

Mechanisms exist to utilize tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services.


Login

Third-Party Management

Mechanisms exist to utilize security safeguards to limit harm from potential adversaries who identify and target the organization's supply chain.


Login

Third-Party Management

Mechanisms exist to address identified weaknesses or deficiencies in the security of the supply chain


Login