GV.SC-05:

Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties

Implementation Examples

Ex1: 

Establish security requirements for suppliers, products, and services commensurate with their criticality level and potential impact if compromised

Ex2: 

Include all cybersecurity and supply chain requirements that third parties must follow and how compliance with the requirements may be verified in default contractual language

Ex3: 

Define the rules and protocols for information sharing between the organization and its suppliers and sub-tier suppliers in agreements

Ex4: 

Manage risk by including security requirements in agreements based on their criticality and potential impact if compromised

Ex5: 

Define security requirements in service-level agreements (SLAs) for monitoring suppliers for acceptable security performance throughout the supplier relationship lifecycle

Ex6: 

Contractually require suppliers to disclose cybersecurity features, functions, and vulnerabilities of their products and services for the life of the product or the term of service

Ex7: 

Contractually require suppliers to provide and maintain a current component inventory (e.g., software or hardware bill of materials) for critical products

Ex8: 

Contractually require suppliers to vet their employees and guard against insider threats

Ex9: 

Contractually require suppliers to provide evidence of performing acceptable security practices through, for example, self-attestation, conformance to known standards, certifications, or inspections

Ex10: 

Specify in contracts and other agreements the rights and responsibilities of the organization, its suppliers, and their supply chains, with respect to potential cybersecurity risks