10 recommendations for securing the IT supply chain

 

Connecting state and local government leaders

NIST's streamlined guidance on risk management focuses on a set of key recommendations for ensuring the security and reliability of information and communications systems.

The National Institute of Standards and Technology has streamlined its recommendations for securing the federal IT supply chain, focusing on a set of key elements to help ensure the security and reliability of information and communications systems agencies are acquiring.

Government increasingly relies on off-the-shelf hardware and software for cost-effective systems, but agencies often lack an understanding of the supply chain and its risks, exposing them to threats such as counterfeit materials, malicious software embedded in products, and other untrustworthy components.

Guidelines included in NIST draft Interagency Report 7622, “Notional Supply Chain Risk Management for Federal Information Systems,” are intended to provide repeatable and commercially reasonable practices. The current draft narrows the recommendations to 10 overarching practices, down from 21 practices in the original draft, released in 2010.


Related story:

Cyber threats easy to predict, so why do they still surprise us?


Supply chain security has been recognized as an essential element of cybersecurity because of the possibility the software and equipment could be compromised at their sources. with back doors or malicious code that could allow adversaries later access to critical IT systems. There also is a threat that counterfeit or other substandard products could jeopardize the safety of systems in which they are used. At the same time, supply chains are becoming more decentralized and complex in a global economy.

“Federal agency information systems are increasingly at risk of both intentional and unintentional supply chain compromise due to the growing sophistication of information and communications technologies and the growing speed and scale of a complex, distributed global supply chain,” the report states.

The recommendations in the document are built primarily on existing practices, many of them already included in NIST and other documents, and are not limited to procurement. The chain extends from product research and development through acquisition and operation to system retirement. Recommendations are intended primarily for use on systems categorized as high-impact level in Federal Information Processing Standard 199.

The recommendations are not prescriptive. “Organizations should select and tailor the practices in this document based on the suitability for a specific application or acquisition and combined impact on the performance, cost and schedule,” the report states.

The recommended risk management practices are:

  • Uniquely identify supply chain elements, processes and actors. Without knowing who and what are in the supply chain, it is impossible to determine what happened, mitigate the incident, and prevent it from happening again.
  • Limit access and exposure within the supply chain. It is critical to limit access to only what is necessary to perform a job and to monitor that access.
  • Create and maintain the provenance of elements, processes, tools and data. Acquirers, integrators, and suppliers should maintain records of the origin of and changes to elements under their control to understand where they have been and who has access to them.
  • Share information within strict limits. Ensure that information gets to those who need it in to perform their jobs, but that it is controlled according to policy.
  • Perform supply chain risk management awareness and training. A strong risk mitigation strategy cannot be put in place without training personnel on policy, procedures, and applicable management, operational, and technical controls and practices.
  • Use defensive design for systems, elements and processes. Defensive design techniques address contingencies in the technical, behavioral and organizational activities that could result in adverse events.
  • Perform continuous integrator review to ensure that defensive measures have been deployed.
  • Strengthen delivery mechanisms. Delivery can be both physical (such as for hardware) and logical (software modules and patches). Because delivery may be compromised anywhere along the supply chain and life cycle, both physical and logical mechanisms should protect the confidentiality, integrity, or availability of elements being delivered.
  • Assure sustainment activities and processes. This includes maintenance, upgrade, patching, replacement and other activities that keep systems operational.
  • Manage disposal and final disposition activities throughout the system or element life cycle. Disposal can occur at any point in the life cycle. While poor disposal procedures can lead to unauthorized access to systems, disposal is often performed by actors who may not be aware of supply chain threats or procedures.

Comments on the draft Interagency Report 7622 should be sent by May 25 to scrm-nist@nist.gov.

 

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.