NIST and Cybersecurity Supply Chain Risk Management
The National Institute of Standards and Technology Special Publication 800-161 (NIST SP 800-161) is a cybersecurity supply chain risk management practices guide that augments baseline information security controls as communicated in NIST SP 800-53.
The NIST SP 800-161 publication provides guidance to organizations on identifying, assessing, and mitigating cybersecurity risks throughout the supply chain at all levels of their organizations. SP 800-161 also integrates cybersecurity supply chain risk management (C-SCRM) into risk management activities by applying a multilevel, C-SCRM-specific approach, including guidance on the development of C-SCRM strategy implementation plans, C-SCRM policies, C-SCRM plans, and risk assessments for products and services.
Assess if security controls are implemented correctly, operating as intended, and meeting requirements
Determine cybersecurity requirements for suppliers
Communicate to suppliers how cybersecurity requirements will be verified and validated
Monitor security controls on an ongoing basis to determine their effectiveness
Enact cybersecurity requirements through formal agreements (e.g., contracts)
Verify that cybersecurity requirements are met through assessment methodologies
Navigate Supply Chain Risk Management with NIST SP 800-161
Download A Checklist for Compliance: NIST SP 800-161 and Supply Chain Risk Management to benchmark your TPRM program against relevant NIST supply chain risk guidelines.
NIST SP 800-161r1 C-SCRM Controls Cross-Mapping
The summary table below maps best practice capabilities to select cybersecurity supply chain risk management controls present in the SP 800-161r1 overlay to SP 800-53r5.
NOTE: This table should not be considered definitive guidance. For a full list of controls, please review the complete SP 800-161 guidance in detail and consult your auditor.
SP 800-53r5 Supply Chain-Specific Controls & Applicable SP 800-161r1 Cybersecurity Risk Management Guidance | How Prevalent Helps |
---|---|
CA-2 (2) Control Assessments | Specialized Assessments Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Enterprises should use various assessment techniques and methodologies, such as continuous monitoring, insider threat assessment, and malicious user assessment. These assessment mechanisms are context-specific and require the enterprise to understand its supply chain and define the required set of measures for assessing and verifying that appropriate protections have been implemented. CA-2 (3) Control Assessments | Leveraging Results from External Organizations Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: For C-SCRM, enterprises should use external security assessments for suppliers, developers, system integrators, external system service providers, and other ICT/OT-related service providers. External assessments include certifications, third-party assessments, and – in the federal context – prior assessments performed by other departments and agencies. Certifications from the International Enterprise for Standardization (ISO), the National Information Assurance Partnership (Common Criteria), and the Open Group Trusted Technology Forum (OTTF) may also be used by non-federal and federal enterprises alike if such certifications meet agency needs. |
Prevalent delivers a large library of pre-built templates for third-party risk assessments – including those specifically built around NIST controls. With Prevalent, you can conduct assessments at the time of supplier onboarding, contract renewal, or at any required frequency (e.g., quarterly or annually) depending on material changes in the relationship. Assessments are managed centrally and backed by workflow, task management, and automated evidence review capabilities to ensure that your team has visibility into third-party risks throughout the relationship lifecycle. Importantly, Prevalent includes built-in remediation recommendations based on risk assessment results to ensure that your third parties address risks in a timely and satisfactory manner and can provide the appropriate evidence to auditors. As part of this process, Prevalent also continuously tracks and analyzes external threats to third parties. Prevalent monitors the Internet and dark web for cyber threats and vulnerabilities, as well as public and private sources of reputational sanctions and financial information. All monitoring data is correlated with assessment results and centralized in a unified risk register for each vendor, streamlining risk review, reporting, remediation and response initiatives. Prevalent also incorporates third-party operational, reputational, and financial data to add context to cyber findings and measure the impact of incidents over time. If required, you can analyze SOC 2 reports or ISO Statement of Applicability in place of a vendor’s risk assessments. Our service reviews the list of control gaps identified within the SOC 2 report, creates risk items against the third party, and tracks and reports against deficiencies over time. |
CP-2 (7) Contingency Plan | Coordinate with External Service Providers Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Enterprises should define and implement a contingency plan for the supply chain information systems and network to ensure that preparations are in place to mitigate the loss or degradation of data or operations. Contingencies should be put in place for the supply chain, network, information systems (especially critical components), and processes to ensure protection against compromise and provide appropriate failover and timely recovery to an acceptable state of operations. IR-4 (10) Incident Handling | Supply Chain Coordination Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: A number of enterprises may be involved in managing incidents and responses for supply chain security. After initially processing the incident and deciding on a course of action (in some cases, the action may be “no action”), the enterprise may need to coordinate with their suppliers, developers, system integrators, external system service providers, other ICT/OT-related service providers, and any relevant interagency bodies to facilitate communications, incident response, root cause, and corrective actions. Enterprises should securely share information through a coordinated set of personnel in key roles to allow for a more comprehensive incident-handling approach. Selecting suppliers, developers, system integrators, external system service providers, and other ICT/OT-related service providers with mature capabilities for supporting supply chain cybersecurity incident handling is important for reducing exposure to cybersecurity risks throughout the supply chain. If transparency for incident handling is limited due to the nature of the relationship, define a set of acceptable criteria in the agreement (e.g., contract). A review (and potential revision) of the agreement is recommended, based on the lessons learned from previous incidents. Enterprises should require their prime contractors to implement this control and flow down this requirement to relevant sub-tier contractors. IR-5 Incident Monitoring Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Enterprises should ensure that agreements with suppliers include requirements to track and document incidents, response decisions, and activities. IR-6 (3) Incident Reporting | Supply Chain Coordination Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Communications of security incident information from the enterprise to suppliers, developers, system integrators, external system service providers, and other ICT/OT-related service providers and vice versa require protection. The enterprise should ensure that information is reviewed and approved for sending based on its agreements with suppliers and any relevant interagency bodies. Any escalation of or exception from this reporting should be clearly defined in the agreement. The enterprise should ensure that incident reporting data is adequately protected for transmission and received by approved individuals only. Enterprises should require their prime contractors to implement this control and flow down this requirement to relevant sub-tier contractors. IR-8(1) Incident Response Plan | Breaches Applicable SP 800-161r1 Cybersecurity Risk Management Guidance:Enterprises should coordinate, develop, and implement an incident response plan that includes information-sharing responsibilities with critical suppliers, and, in a federal context, interagency partners and the FASC. Enterprises should require their prime contractors to implement this control and flow down this requirement to relevant sub-tier contractors. |
As part of your broader incident management strategy Prevalent ensures that your third-party incident response program can rapidly identify, respond to, report on, and mitigate the impact of third-party vendor security incidents. Prevalent’s managed services team includes dedicated experts who centrally manage your vendors; conduct proactive event risk assessments; score identified risks; correlate risks with continuous cyber monitoring intelligence; and issue remediation guidance on your organization’s behalf. Managed services greatly reduce the time required to identify vendors impacted by a cybersecurity incident, coordinate with vendors, and ensure that remediations are in place. Key capabilities in the Prevalent Third-Party Incident Response Service include:
Prevalent also analyzes databases that contain several years of data breach history for thousands of companies around the world – including types and quantities of stolen data; compliance and regulatory issues; and real-time vendor data breach notifications. Armed with these insights, your team can better understand the scope and impact of the incident; what data was involved; whether the third party’s operations were impacted; and when remediations have been completed – all by leveraging experts. |
PM-9 Risk Management Strategy Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: The risk management strategy should address cybersecurity risks throughout the supply chain. PM-30 Supply Chain Risk Management Strategy Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: The Supply Chain Risk Management Strategy (also known as C-SCRM Strategy) should be complemented with a C-SCRM Implementation Plan that lays out detailed initiatives and activities for the enterprise with timelines and responsible parties. This implementation plan can be a POA&M or be included in a POA&M. Based on the C-SCRM Strategy and Implementation Plan at Level 1, the enterprise should select and document common C-SCRM controls that should address the enterprise, program, and system-specific needs. |
Prevalent helps your organization build a comprehensive third-party risk management (TPRM) or cybersecurity supply chain risk management (C-SCRM) program in line with your broader information security and governance, enterprise risk management and compliance programs. Our experts collaborate with your team on:
As part of this process, we help you define:
With Prevalent, your team can continually evaluate the effectiveness of your TPRM program according to changing business needs and priorities, measuring third-party vendor key performance indicators (KPIs) and key risk indicators (KRIs) through the relationship lifecycle. |
PM 30 (1) Supply Chain Risk Management Strategy | Suppliers of Critical or Mission-Essential Items Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: See above. |
Prevalent quantifies inherent risks for all third parties. Criteria used to calculate inherent risk for third-party prioritization includes:
From this inherent risk assessment, your team can automatically tier suppliers; set appropriate levels of further diligence; and determine the scope of ongoing assessments. Rule-based tiering logic enables vendor categorization using a range of data interaction, financial, regulatory, and reputational considerations. |
PM-31 Continuous Monitoring Strategy Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: The continuous monitoring strategy and program should integrate C-SCRM controls. |
Continuously track and analyze external threats to third parties with Prevalent. We monitor the Internet and the dark web for cyber threats and vulnerabilities, as well as public and private sources of reputational risks, sanctions, and financial information. Monitoring sources include:
All monitoring data is correlated with assessment results and centralized in a unified risk register for each vendor, streamlining risk review, reporting, remediation, and response initiatives. Once all assessment and monitoring data is correlated into a central risk register, Prevalent applies risk scoring and prioritization according to a likelihood and impact model. This model frames risks into a matrix, so you can easily see the highest impact risks and can prioritize remediation efforts on those. Then, you can assign owners and track risks and remediations to a level acceptable to the business. |
RA-1 Policy and Procedures Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Risk assessments should be performed at the enterprise, mission/program, and operational levels. The system-level risk assessment should include both the supply chain infrastructure (e.g., development and testing environments and delivery systems) and the information system/components traversing the supply chain. System-level risk assessments significantly intersect with the SDLC and should complement the enterprise’s broader RMF activities, which take part during the SDLC. A criticality analysis will ensure that mission-critical functions and components are given higher priority due to their impact on the mission if compromised. The policy should include supply chain-relevant cybersecurity roles that apply to performing and coordinating risk assessments across the enterprise (see Section 2 for the listing and description of roles). Applicable roles within suppliers, developers, system integrators, external system service providers, and other ICT/OT-related service providers should be defined. |
See PM-9 Risk Management Strategy |
RA-2 (1) Security Categorization | Impact-Level Prioritization Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Security categorization is critical to C-SCRM at Levels 1, 2, and 3. In addition to [FIPS 199] categorization, security categorization for C-SCRM should be based on the criticality analysis that is performed as part of the SDLC. See Section 2 and [NISTIR 8179] for a detailed description of criticality analysis. |
See PM 30 (1) Supply Chain Risk Management Strategy | Suppliers of Critical or Mission-Essential Items |
RA-3 (1) Risk Assessment | Supply Chain Risk Assessment Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Risk assessments should include an analysis of criticality, threats, vulnerabilities, likelihood, and impact, as described in detail in Appendix C. The data to be reviewed and collected includes C-SCRM-specific roles, processes, and the results of system/component and services acquisitions, implementation, and integration. Risk assessments should be performed at Levels 1, 2, and 3. Risk assessments at higher levels should consist primarily of a synthesis of various risk assessments performed at lower levels and used for understanding the overall impact with the level (e.g., at the enterprise or mission/function levels). C-SCRM risk assessments should complement and inform risk assessments, which are performed as ongoing activities throughout the SDLC, and processes should be appropriately aligned with or integrated into ERM processes and governance. |
The Prevalent TPRM Platform includes a large library of pre-built templates for third-party risk assessments – including those specifically built around NIST controls. Assessments can be conducted at the time of supplier onboarding, contract renewal, or at any required frequency (e.g., quarterly, or annually) depending on material changes. Assessments are managed centrally and backed by workflow, task management, and automated evidence review capabilities to ensure that your team has visibility into third-party risks throughout the relationship lifecycle. Importantly, Prevalent includes built-in remediation recommendations based on risk assessment results to ensure that your third parties address risks in a timely and satisfactory manner and can provide the appropriate evidence to auditors. |
RA-3 (2) Risk Assessment | Use of All-Source Intelligence RA-3 (3) Risk Assessment | Dynamic Threat Awareness RA-3 (4) Risk Assessment | Predictive Cyber Analytics Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: See RA-3 (1) |
With Prevalent, you can continuously track and analyze external threats to third parties. As part of this, we monitor the Internet and dark web for cyber threats and vulnerabilities, as well as public and private sources of reputational, sanctions and financial information. Monitoring sources include:
All monitoring data is correlated with assessment results and centralized in a unified risk register for each vendor, streamlining risk review, reporting, remediation, and response initiatives. |
RA-7 Risk Response Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Enterprises should integrate capabilities to respond to cybersecurity risks throughout the supply chain into the enterprise’s overall response posture, ensuring that these responses are aligned to and fall within the boundaries of the enterprise’s tolerance for risk. Risk response should include consideration of risk response identification, evaluation of alternatives, and risk response decision activities. |
Once all assessment and monitoring data is correlated into a central risk register, Prevalent applies risk scoring and prioritization according to a likelihood and impact model. This model frames risks into a matrix, so you can easily see the highest impact risks and can prioritize remediation efforts on those. Finally, assign owners and track risks and remediations in the Platform to a level acceptable to the business. |
RA-9 Criticality Analysis Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Enterprises should complete a criticality analysis as a prerequisite input to assessments of cybersecurity supply chain risk management activities. First, enterprises should complete a criticality analysis as part of the Frame step of the C-SCRM Risk Management Process. Then, findings generated in the Assess step activities (e.g., criticality analysis, threat analysis, vulnerability analysis, and mitigation strategies) update and tailor the criticality analysis. A symbiotic relationship exists between the criticality analysis and other Assess step activities in that they inform and enhance one another. For a high-quality criticality analysis, enterprises should employ it iteratively throughout the SLDC and concurrently across the three levels. Enterprises should require their prime contractors to implement this control and flow down this requirement to relevant sub-tier contractors. Departments and agencies should also refer to Appendix F to supplement this guidance in accordance with Executive Order 14028, Improving the Nation’s Cybersecurity. |
See PM 30 (1) Supply Chain Risk Management Strategy | Suppliers of Critical or Mission-Essential Items |
SR-1 Policy and Procedures Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: C-SCRM policies are developed at Level 1 for the overall enterprise and at Level 2 for specific missions and functions. C-SCRM policies can be implemented at Levels 1, 2, and 3, depending on the level of depth and detail. C-SCRM procedures are developed at Level 2 for specific missions and functions and at Level 3 for specific systems. Enterprise functions including but not limited to information security, legal, risk management, and acquisition should review and concur on the development of C-SCRM policies and procedures or provide guidance to system owners for developing system-specific C-SCRM procedures. |
See PM-9 Risk Management Strategy |
SR-2 Supply Chain Risk Management Plan Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: C-SCRM plans describe implementations, requirements, constraints, and implications at the system level. C-SCRM plans are influenced by the enterprise’s other risk assessment activities and may inherit, and tailor common control baselines defined at Level 1 and Level 2. C-SCRM plans defined at Level 3 work in collaboration with the enterprise’s C-SCRM Strategy and Policies (Level 1 and Level 2) and the C-SCRM Implementation Plan (Level 1 and Level 2) to provide a systematic and holistic approach for cybersecurity supply chain risk management across the enterprise. C-SCRM plans should be developed as a standalone document and only integrated into existing system security plans if enterprise constraints require it. |
See PM-9 Risk Management Strategy |
SR-3 Supply Chain Controls and Processes Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Section 2 and Appendix C of this document provide detailed guidance on implementing this control. Departments and agencies should refer to Appendix F to implement this guidance in accordance with Executive Order 14028 on Improving the Nation's Cybersecurity. |
See PM-9 Risk Management Strategy |
SR-4 (4) Provenance | Supply Chain Integrity – Pedigree Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Provenance should be documented for systems, system components, and associated data throughout the SDLC. Enterprises should consider producing SBOMs for applicable and appropriate classes of software, including purchased software, open-source software, and in-house software. SBOMs should be produced using only NTIA-supported SBOM formats that can satisfy [NTIA SBOM] EO 14028 NTIA minimum SBOM elements. Enterprises producing SBOMs should use [NTIA SBOM] minimum SBOM elements as framing for the inclusion of primary components. SBOMs should be digitally signed using a verifiable and trusted key. SBOMs can play a critical role in enabling organizations to maintain provenance. However, as SBOMs mature, organizations should ensure they do not deprioritize existing C-SCRM capabilities (e.g., vulnerability management practices, and vendor risk assessments) under the mistaken assumption that SBOM replaces these activities. SBOMs and the improved transparency they are meant to provide organizations are complementary capabilities, not substitutive ones. Organizations that may not appropriately ingest, analyze, and act on the data that SBOMs provide will likely not improve their overall C-SCRM posture. Federal agencies should refer to Appendix F to implement this guidance in accordance with Executive Order 14028 on Improving the Nation's Cybersecurity. |
As part of the due diligence process, Prevalent enables vendors to provide updated software bills of materials (SBOMs) for their software products. This helps you identify any potential vulnerabilities or licensing issues that may impact your organization’s security and compliance. |
SR-5 Acquisition Strategies, Tools, and Methods Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Section 3 and SA controls provide additional guidance on acquisition strategies, tools, and methods. Departments and agencies should refer to Appendix F to implement this guidance in accordance with Executive Order 14028 on Improving the Nation's Cybersecurity. |
Prevalent enables your team to centralize and automate the distribution, comparison, and management of requests for proposals (RFPs) and requests for information (RFIs) in a single solution that enables comparison of key attributes. As all service providers are being centralized and reviewed, the Prevalent Platform creates comprehensive vendor profiles that contain insight into a vendor’s demographic information, 4th-party technologies, ESG scores, recent business and reputational insights, data breach history, and recent financial performance. This level of due diligence creates greater context for making vendor selection decisions. |
SR-6 Supplier Assessments and Reviews Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Generally, an enterprise should consider any information pertinent to the security, integrity, resilience, quality, trustworthiness, or authenticity of the supplier or their provided services or products. Enterprises should consider applying this information against a consistent set of core baseline factors and assessment criteria to facilitate equitable comparison (between suppliers and over time). Depending on the specific context and purpose for which the assessment is being conducted, the enterprise may select additional factors. The quality of information (e.g., its relevance, completeness, accuracy, etc.) relied upon for an assessment is also an important consideration. Reference sources for assessment information should also be documented. The C-SCRM PMO can help define requirements, methods, and tools for the enterprise’s supplier assessments. Departments and agencies should refer to Appendix E for further guidance concerning baseline risk factors and the documentation of assessments and Appendix F to implement this guidance in accordance with Executive Order 14028, Improving the Nation’s Cybersecurity. |
See RA-3 (1) Risk Assessment | Supply Chain Risk Assessment |
SR-8 Notification Agreements Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: At minimum, enterprises should require their suppliers to establish notification agreements with entities within their supply chain that have a role or responsibility related to that critical service or product. Departments and agencies should refer to Appendix F to implement this guidance in accordance with Executive Order 14028, Improving the Nation’s Cybersecurity. |
Prevalent enables your team to centralize the distribution, discussion, retention, and review of vendor contracts to automate the contract lifecycle and ensure key clauses are enforced. Key capabilities include:
With this capability, you can ensure that clear responsibilities and right-to-audit clauses are articulated in the vendor contract, and SLAs tracked and managed accordingly. |
SR-13 Supplier Inventory Applicable SP 800-161r1 Cybersecurity Risk Management Guidance: Enterprises rely on numerous suppliers to execute their missions and functions. Many suppliers provide products and services in support of multiple missions, functions, programs, projects, and systems. Some suppliers are more critical than others, based on the criticality of missions, functions, programs, projects, and systems that their products and services support, and the enterprise’s level of dependency on the supplier. Enterprises should use criticality analysis to help determine which products and services are critical to determining the criticality of suppliers to be documented in the supplier inventory. See Section 2, Appendix C, and RA-9 for guidance on conducting criticality analysis. |
The Prevalent TPRM Platform centralizes all supplier insights into a single supplier profile so that all departments that engage with suppliers are leveraging the same information, improving visibility and decision-making. Import vendors via a spreadsheet template or through an API connection to an existing procurement solution, eliminating error-prone, manual processes. Populate key supplier details with a centralized and customizable intake form and associated workflow. This is available to everyone via email invitation, without requiring any training or solution expertise. With Prevalent, you can build comprehensive supplier profiles that compare and monitor supplier demographics, geographic location, fourth-party technologies, and recent operational insights. Having this accumulated data will enable you to report on and take action against geographic and technology concentration risks especially. |
Align Your TPRM Program with ISO, NIST, SOC 2 and More
Download this guide to review specific requirements from 11 different cybersecurity authorities, identify TPRM capabilities that map to each requirement, and uncover best practices for ensuring compliance.
Benchmark your TPRM program against the applicable guidance in NIST SP 800-53.
Enhanced cybersecurity supply chain risk management guidance has arrived with the final NIST CSF 2.0. Check...
Learn about the applicable third-party cybersecurity risk management guidelines in NIST SP 800-53 and implement best...