NIST Third Party Compliance Checklist
NIST Third Party Compliance Checklist
NIST Third Party Compliance Checklist
2
NIST and Third-Party Risk Management
The National Institute of Standards and Technology (NIST) is a federal agency within the United States
Department of Commerce. NIST’s responsibilities include establishing computer and information
technology-related standards and guidelines for federal agencies. Because NIST publishes and maintains
key resources for managing cybersecurity risks applicable to any company, nearly 50% of private sector
organizations have also adopted their guidelines, making NIST publications the primary standards for
evaluating IT controls.
Although several NIST special publications have specific controls that address third-party supplier
IT security, the most applicable are:
• SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations
• SP 800-161 Rev. 1: Cybersecurity Supply Chain Risk Management Practices for Federal Information
Systems and Organizations
These guidelines complement one another, so your organization can standardize on one special publication
can cross-map to the others – in effect meeting multiple requirements using a single framework.
This guide examines the applicable supply chain cybersecurity controls and guidance in NIST publications
and identifies capabilities available in the Prevalent Third-Party Risk Management Platform that you can use
to meet NIST requirements for stronger supply chain security.
Acknowledging the increasing number of third-party supplier-related data breaches and other security
events, SP 800-53 Rev. 5 expands and refines the supply chain security and privacy guidelines by
establishing an entirely new control group, “SR-Supply Chain Risk Management.” It also requires
organizations to develop and plan for managing supply chain risks by:
• Using formal risk management plans and policies to drive the supply chain management process
• Emphasizing security and privacy through collaboration in identifying risks and threats, and through the
application of security and privacy-based controls
• Requiring transparency of systems and products (e.g., lifecycle, traceability, and component authenticity)
• Increasing awareness of the need to pre-assess organizations, and to ensure visibility into issues
and breaches
3
How SP 800-161 Rev. 1 Complements Supply Chain Risk Management
NIST SP 800-53 is considered the foundation upon which all other cybersecurity controls are built. With
SP 800-161 Rev. 1, NIST outlines a complementary framework to frame, assess, respond to, and monitor
cybersecurity supply chain risks.
SP 800-161 further identifies the following dimensions that form the framework of cybersecurity supply
chain management:
Together, SP 800-53 and supplemental SP 800-161 control guidance present a comprehensive framework
for assessing and mitigating supplier cybersecurity risks.
• ID.SC-4: Routinely assess suppliers and third-party partners using audits, test results, or other forms of
evaluations to confirm they are meeting their contractual obligations.
• ID.SC-5: Conduct response and recovery planning and testing with suppliers and third-party providers.
The next section of this checklist cross-maps applicable supplier risk management guidance between
these three NIST publications.
4
Mapping Prevalent Capabilities to NIST Cybersecurity Supply
Chain Risk Management Control Requirements
The summary table below maps capabilities available in the Prevalent Third-Party Risk Management
Platform to select third-party vendor or supplier controls present in SP 800-53, with SP 800-161 and the
Cybersecurity Framework v1.1 control overlays (bolded) applied to the table to illustrate cross-mapping.
NOTE: This table should not be considered definitive guidance. For a complete list of controls, please review
the complete SP 800-53, SP 800-161 and Cybersecurity Framework v1.1 requirements in detail and consult
your auditor.
Supplemental C-SCRM Guidance: Enterprises should use a variety of assessment techniques and
methodologies, such as continuous monitoring, insider threat assessment, and malicious user assessment.
These assessment mechanisms are context-specific and require the enterprise to understand its supply
chain and to define the required set of measures for assessing and verifying that appropriate protections
have been implemented.
Supplemental C-SCRM Guidance: For C-SCRM, enterprises should use external security assessments
for suppliers, developers, system integrators, external system service providers, and other ICT/OTrelated
service providers. External assessments include certifications, third-party assessments, and – in the
federal context – prior assessments performed by other departments and agencies. Certifications from
the International Enterprise for Standardization (ISO), the National Information Assurance Partnership
(Common Criteria), and the Open Group Trusted Technology Forum (OTTF) may also be used by non-
federal and federal enterprises alike, if such certifications meet agency needs.
5
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
6
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
ID.RA-1: Asset Vulnerabilities are Prevalent VTM reveals third-party cyber incidents for
identified and documented. 550,000 actively tracked companies by monitoring 1,500+
criminal forums; thousands of onion pages, 80+ dark web
DE.AE-2: Detected events are analyzed to
special access forums; 65+ threat feeds; and 50+ paste
understand attack targets and methods.
sites for leaked credentials — as well as several security
DE.AE-3: Event data are collected and communities, code repositories, and vulnerability databases.
correlated from multiple sources and
Prevalent then normalizes, correlates and analyzes
sensors.
information from across multiple inputs, including inside-
DE.CM-1: The network is monitored to out risk assessments and outside-in monitoring from
detect potential cybersecurity events. Prevalent Vendor Threat Monitor and BitSight. This unified
model provides context, quantification, management and
RS.AN-1: Notifications from detection remediation support.
systems are investigated.
7
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
ID.BE-1: The organization’s role in the supply The Prevalent Third-Party Incident Response Service
chain is identified and communicated. enables you to rapidly identify and mitigate the impact of
supply chain breaches by centrally managing vendors,
ID.SC-5: Response and recovery planning
proactively conducting event assessments, scoring identified
and testing are conducted with suppliers
risks, and accessing remediation guidance.
and third-party providers.
The Prevalent Platform includes unified capabilities for
PR.IP-9: Response plans (Incident Response
assessing, analyzing and addressing weaknesses in supplier
and Business Continuity) and recovery plans
business resilience plans. This enables you to proactively
(Incident Recovery and Disaster Recovery)
work with your supplier community to prepare for pandemics,
are in place and managed.
environmental disasters, and other potential crises.
DE.AE-4: Impact of events is determined.
In addition to facilitating automated, periodic internal control-
RS.RP-1: Response plan is executed based assessments, the Prevalent Platform provides cyber
during or after an incident. security, business, reputational and financial monitoring
– continually assessing third parties to identify potential
RS.CO-3: Information is shared consistent weaknesses that can be exploited by cyber criminals.
with response plans.
All risk intelligence is centralized, correlated and analyzed in
RS.CO-4: Coordination with stakeholders a single risk register that automates reporting and response,
occurs consistent with response plans. and features a flexible weighted scoring model based on
likelihood of an event and its impact.
RS.AN-2: The impact of the incident is understood.
8
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
Supplemental C-SCRM Guidance: A number of enterprises may be involved in managing incidents and
responses for supply chain security. After initially processing the incident and deciding on a course of action
(in some cases, the action may be “no action”), the enterprise may need to coordinate with their suppliers,
developers, system integrators, external system service providers, other ICT/OT-related service providers,
and any relevant interagency bodies to facilitate communications, incident response, root cause, and
corrective actions. Enterprises should securely share information through a coordinated set of personnel in
key roles to allow for a more comprehensive incident handling approach. Selecting suppliers, developers,
system integrators, external system service providers, and other ICT/OT-related service providers with
mature capabilities for supporting supply chain cybersecurity incident handling is important for reducing
exposure to cybersecurity risks throughout the supply chain. If transparency for incident handling is limited
due to the nature of the relationship, define a set of acceptable criteria in the agreement (e.g., contract).
A review (and potential revision) of the agreement is recommended, based on the lessons learned from
previous incidents. Enterprises should require their prime contractors to implement this control and flow
down this requirement to relevant sub-tier contractors.
ID.SC-5: Response and recovery planning The Prevalent Third-Party Incident Response Service
and testing are conducted with suppliers enables you to rapidly identify and mitigate the impact supply
and third-party providers. chain breaches by centrally managing vendors, proactively
conducting event assessments, scoring identified risks, and
DE.AE-2: Detected events are analyzed to
accessing remediation guidance.
understand attack targets and methods.
The Prevalent Platform includes unified capabilities for
DE.AE-3: Event data are collected
assessing, analyzing and addressing weaknesses in supplier
and correlated from multiple sources
business resilience plans. This enables you to proactively
and sensors.
work with your supplier community to prepare for pandemics,
DE.AE-4: Impact of events is determined. environmental disasters, and other potential crises.
DE.AE-5: Incident alert thresholds are In addition to facilitating automated, periodic internal
established. control-based assessments, the Prevalent Platform
provides cyber security, business, reputational and financial
RS.RP-1: Response plan is executed monitoring – continually assessing third parties to identify
during or after an incident. potential weaknesses that can be exploited by cyber
criminals.
RS.CO-3: Information is shared consistent
with response plans. All risk intelligence is centralized, correlated and analyzed in
a single risk register that automates reporting and response,
and features a flexible weighted scoring model based on
likelihood of an event and its impact.
9
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
IR-5 Incident Monitoring Prevalent Contract Essentials is a SaaS solution that centralizes
the distribution, discussion, retention, and review of vendor
Supplemental C-SCRM Guidance:
contracts. It also includes workflow capabilities to automate the
Enterprises should ensure that
contract lifecycle from onboarding to offboarding. With Contract
agreements with suppliers include
Essentials, your procurement and legal teams have a single
requirements to track and document
solution to ensure that key contract clauses are in place, and that
incidents, response decisions,
service levels and response times are managed.
and activities.
Supplemental C-SCRM Guidance: Communications of security incident information from the enterprise
to suppliers, developers, system integrators, external system service providers, and other ICT/OT-related
service providers and vice versa require protection. The enterprise should ensure that information is
reviewed and approved for sending based on its agreements with suppliers and any relevant interagency
bodies. Any escalation of or exception from this reporting should be clearly defined in the agreement. The
enterprise should ensure that incident reporting data is adequately protected for transmission and received
by approved individuals only. Enterprises should require their prime contractors to implement this control
and flow down this requirement to relevant sub-tier contractors.
10
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
Incident Reporting | Supply Chain All risk intelligence in the Prevalent Platform is centralized,
Coordination Continued correlated and analyzed in a single risk register that
automates reporting and response, and features a flexible
ID.SC-5: Response and recovery planning
weighted scoring model based on likelihood of an event and
and testing are conducted with suppliers
its impact.
and third-party providers.
IR-8 Incident Response Plan The Prevalent Third-Party Incident Response Service
enables you to rapidly identify and mitigate the impact supply
Supplemental C-SCRM Guidance:
chain breaches by centrally managing vendors, conducting
Enterprises should coordinate, develop,
event assessments, scoring identified risks, and accessing
and implement an incident response
remediation guidance. The Incident Response Service
plan that includes information-sharing
responsibilities with critical suppliers and, provides the foundation to be well prepared for board and
in a federal context, interagency partners executive questions regarding the impact of supply chain
and the FASC. Enterprises should require incidents; and demonstrate proof of your third-party breach
their prime contractors to implement this response plan with auditors and regulators.
control and flow down this requirement to
relevant sub-tier contractors.
Supplemental C-SCRM Guidance: When addressing supply chain threat awareness, knowledge should be
shared between stakeholders within the boundaries of the organization’s information sharing policy.
ID.RA-2: Cyber threat intelligence is Prevalent VTM reveals third-party cyber incidents for 550,000
received from information sharing forums actively tracked companies by monitoring 1,500+ criminal
and sources. forums; thousands of onion pages, 80+ dark web special
access forums; 65+ threat feeds; and 50+ paste sites for leaked
ID.RA-3: Threats, both internal and credentials — as well as several security communities, code
external, are identified and documented. repositories, and vulnerability databases.
ID.RA-5: Threats, vulnerabilities, Prevalent then normalizes, correlates and analyzes information
likelihoods, and impacts are used to from across multiple inputs, including inside-out risk
determine risk assessments and outside-in monitoring from Prevalent Vendor
Threat Monitor and BitSight. This unified model provides
context, quantification, management and remediation support.
11
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
PM-31 Continuous Monitoring Strategy Prevalent VTM reveals third-party cyber incidents for
550,000 actively tracked companies by monitoring 1,500+
Supplemental C-SCRM Guidance:
criminal forums; thousands of onion pages, 80+ dark web
The continuous monitoring strategy
special access forums; 65+ threat feeds; and 50+ paste
and program should integrate C-SCRM
sites for leaked credentials — as well as several security
controls at Levels 1, 2, and 3 in
communities, code repositories, and vulnerability databases.
accordance with the Supply Chain Risk
Management Strategy. Prevalent then normalizes, correlates and analyzes
information from across multiple inputs, including inside-
out risk assessments and outside-in monitoring from
Prevalent Vendor Threat Monitor and BitSight. This unified
model provides context, quantification, management and
remediation support.
12
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
RA-1 Policy and Procedures The Prevalent Platform includes more than 100 standardized
risk assessment survey templates – including for NIST, ISO
Supplemental C-SCRM Guidance:
and many others — a custom survey creation wizard, and
Risk assessments should be performed
a questionnaire that maps responses to any compliance
at the enterprise, mission/program, and
regulation or framework. All assessments are based on
operational levels. The system-level
industry standards and address all information security
risk assessment should include both
topics as they pertain to supply chain partner security
the supply chain infrastructure (e.g.,
controls.
development and testing environments
and delivery systems) and the information With the Prevalent Platform, you can automatically generate
system/components traversing the supply a risk register upon survey completion, ensuring that the
chain. System-level risk assessments entire risk profile (or a role-specific version) can be viewed
significantly intersect with the SDLC in the centralized, real-time reporting dashboard – and
and should complement the enterprise’s reports can be downloaded and exported to determine
broader RMF activities, which take part compliance status. This filters out unnecessary noise and
during the SDLC. A criticality analysis zeroes in on areas of possible concern, providing visibility
will ensure that mission-critical functions and trending to measure program effectiveness. Then, you
and components are given higher priority can take actionable steps to reduce vendor risk with built-in
due to their impact on the mission, if remediation recommendations
compromised. The policy should include and guidance.
supply chainrelevant cybersecurity roles
that are applicable to performing and
coordinating risk assessments across the
enterprise (see Section 2 for the listing
and description of roles). Applicable roles
within suppliers, developers, system
integrators, external system service
providers, and other ICT/OT-related
service providers should be defined.
13
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
Supplemental C-SCRM Guidance: Risk assessments should include an analysis of criticality, threats,
vulnerabilities, likelihood, and impact, as described in detail in Appendix C. The data to be reviewed and
collected includes C-SCRM-specific roles, processes, and the results of system/component and services
acquisitions, implementation, and integration. Risk assessments should be performed at Levels 1, 2, and
3. Risk assessments at higher levels should consist primarily of a synthesis of various risk assessments
performed at lower levels and used for understanding the overall impact with the level (e.g., at the
enterprise or mission/function levels). C-SCRM risk assessments should complement and inform risk
assessments, which are performed as ongoing activities throughout the SDLC, and processes should be
appropriately aligned with or integrated into ERM processes and governance.
ID.RA-1: Asset Vulnerabilities are The Prevalent Platform includes more than 100 standardized
identified and documented. risk assessment survey templates – including for NIST, ISO
and many others — a custom survey creation wizard, and
ID.RA-3: Threats, both internal and
a questionnaire that maps responses to any compliance
external, are identified and documented.
regulation or framework. All assessments are based on
ID.RA-4: Potential business impacts and industry standards and address all information security
likelihoods are identified. topics as they pertain to supply chain partner security
controls. Prevalent offers security, privacy, and risk
ID.RA-5: Threats, vulnerabilities, management professionals an automated platform to manage
likelihoods, and impacts are used to the vendor risk assessment process and determine vendor
determine risk. compliance with IT security, regulatory, and data privacy
requirements.
ID.SC-2: Suppliers and third party
partners of information systems, In addition to facilitating automated, periodic internal
components, and services are identified, control-based assessments, the Prevalent Platform also
prioritized, and assessed using a cyber provides cyber security, business, reputational and financial
supply chain risk assessment process monitoring – continually assessing third parties to identify
potential weaknesses that can be exploited by cyber
CSF DE.AE-4: Impact of events
criminals.
is determined.
All risk intelligence in the Prevalent Platform is centralized,
RS.MI-3: Newly identified vulnerabilities
correlated and analyzed in a single risk register that
are mitigated or documented as
automates reporting and response, and features a flexible
accepted risks.
weighted scoring model based on likelihood of an event and
its impact.
14
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
15
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
16
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
Supplemental C-SCRM Guidance: This control enhancement is relevant to C-SCRM and plans for
continuous monitoring of control effectiveness and should therefore be extended to suppliers, developers,
system integrators, external system service providers, and other ICT/OT-related service providers.
PR.IP-2: A System Development Life In addition to facilitating automated, periodic internal control-
Cycle to manage systems is implemented. based assessments, the Prevalent Platform also provides
cyber security, business, reputational and financial monitoring
DE.CM-6: External service provider
– continually assessing third parties to identify potential
activity is monitored to detect potential
weaknesses that can be exploited by cyber criminals.
cybersecurity events.
All risk intelligence in the Prevalent Platform is centralized,
correlated and analyzed in a single risk register that
automates reporting and response, and features a flexible
weighted scoring model based on likelihood of an event and
its impact.
17
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
Supplemental C-SCRM Guidance: System monitoring information may be correlated with that of
suppliers, developers, system integrators, external system service providers, and other ICT/OT-related
service providers, if appropriate. The results of correlating monitoring information may point to supply
chain cybersecurity vulnerabilities that require mitigation or compromises.
DE.AE-1: A baseline of network operations Prevalent VTM continuously tracks and analyzes externally
and expected data flows for users and observable threats to vendors and other third parties. The
systems is established and managed. service complements and validates vendor-reported security
control data from the Prevalent Platform by monitoring the
DE.AE-2: Detected events are analyzed to
Internet and dark web for cyber threats and vulnerabilities
understand attack targets and methods.
— and correlating assessment findings with research on
DE.AE-3: Event data are collected and operational, financial, legal and brand risks in a unified risk
correlated from multiple sources and register that enables centralized risk triage and response.
sensors.
All risk intelligence in the Prevalent Platform is centralized,
DE.AE-4: Impact of events is determined. correlated and analyzed in a single risk register that
automates reporting and response, and features a flexible
DE.CM-1: The network is monitored to weighted scoring model based on likelihood of an event and
detect potential cybersecurity events. its impact.
18
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
Supplemental C-SCRM Guidance: The enterprise should evaluate security alerts, advisories, and
directives for cybersecurity supply chain impacts and follow up if needed. US-CERT, FASC, and other
authoritative entities generate security alerts and advisories that are applicable to C-SCRM. Additional
laws and regulations will impact who and how additional advisories are provided. Enterprises should
ensure that their information-sharing protocols and processes include sharing alerts, advisories, and
directives with relevant parties with whom they have an agreement to deliver products or perform services.
Enterprises should provide direction or guidance as to what actions are to be taken in response to sharing
such an alert, advisory, or directive. Enterprises should require their prime contractors to implement this
control and flow down this requirement to relevant sub-tier contractors. Departments and agencies should
refer to Appendix F to implement this guidance in accordance with Executive Order 14028, Improving the
Nation’s Cybersecurity.
ID.RA-1: Asset Vulnerabilities are Prevalent VTM continuously tracks and analyzes externally
identified and documented. observable threats to vendors and other third parties. The
service complements and validates vendor-reported security
ID.RA-2: Cyber threat intelligence is
control data from the Prevalent Platform by monitoring the
received from information sharing forums
Internet and dark web for cyber threats and vulnerabilities
and sources.
— and correlating assessment findings with research on
ID.RA-3: Threats, both internal and operational, financial, legal and brand risks in a unified risk
external, are identified and documented. register that enables centralized risk triage and response.
RS.CO-5: Voluntary information sharing All risk intelligence in the Prevalent Platform is centralized,
occurs with external stakeholders correlated and analyzed in a single risk register that
to achieve broader cybersecurity automates reporting and response, and features a flexible
situational awareness. weighted scoring model based on likelihood of an event and
its impact.
RS.AN-5: Processes are established
to receive, analyze and respond
to vulnerabilities disclosed to the
organization from internal and external
sources (e.g. internal testing, security
bulletins, or security researchers).
19
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
SR-1 Policy and Procedures Prevalent Program Design Services define and document
your third-party risk management program. You get a clear
Supplemental C-SCRM Guidance:
plan that accounts for your specific needs while incorporating
C-SCRM policies are developed at Level
best practices for end-to-end TPRM.
1 for the overall enterprise and at Level
2 for specific missions and functions.
C-SCRM policies can be implemented at
Levels 1, 2, and 3, depending on the level
of depth and detail. C-SCRM procedures
are developed at Level 2 for specific
missions and functions and at Level 3 for
specific systems. Enterprise functions
including but not limited to information
security, legal, risk management, and
acquisition should review and concur on
the development of C-SCRM policies and
procedures or provide guidance to system
owners for developing system-specific
C-SCRM procedures.
20
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
SR-2 Supply Chain Risk Prevalent Program Design Services help you to continually
Management Plan improve your Prevalent Platform deployment, ensuring
that your TPRM program maintains the flexibility
Supplemental C-SCRM Guidance:
and agility it needs to meet evolving business and
C-SCRM plans describe implementations,
regulatory requirements.
requirements, constraints, and
implications at the system level. C-SCRM
plans are influenced by the enterprise’s
other risk assessment activities and
may inherit and tailor common control
baselines defined at Level 1 and Level 2.
C-SCRM plans defined at Level 3 work
in collaboration with the enterprise’s
C-SCRM Strategy and Policies (Level
1 and Level 2) and the C-SCRM
Implementation Plan (Level 1 and Level
2) to provide a systematic and holistic
approach for cybersecurity supply chain
risk management across the enterprise.
C-SCRM plans should be developed as a
standalone document and only integrated
into existing system security plans if
enterprise constraints require it.
21
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
SR-6 Supplier Assessments and Reviews The Prevalent Platform includes more than 100 standardized
risk assessment survey templates – including for NIST, ISO
Supplemental C-SCRM Guidance: In
and many others — a custom survey creation wizard, and
general, an enterprise should consider
a questionnaire that maps responses to any compliance
any information pertinent to the
regulation or framework. All assessments are based on
security, integrity, resilience, quality,
industry standards and address all information security
trustworthiness, or authenticity of the
topics as they pertain to supply chain partner security and
supplier or their provided services or
business resilience controls.
products. Enterprises should consider
applying this information against a Prevalent VTM continuously tracks and analyzes externally
consistent set of core baseline factors and observable threats to vendors and other third parties. The
assessment criteria to facilitate equitable service complements and validates vendor-reported security
comparison (between suppliers and over control data from the Prevalent Platform by monitoring the
time). Depending on the specific context Internet and dark web for cyber threats and vulnerabilities
and purpose for which the assessment — and correlating assessment findings with research on
is being conducting, the enterprise may operational, financial, legal and brand risks in a unified risk
select additional factors. The quality register that enables centralized risk triage and response.
of information (e.g., its relevance,
completeness, accuracy, etc.) relied upon
for an assessment is also an important
consideration. Reference sources for
assessment information should also be
documented. The C-SCRM PMO can help
define requirements, methods, and tools
for the enterprise’s supplier assessments.
Departments and agencies should refer
to Appendix E for further guidance
concerning baseline risk factors and
the documentation of assessments and
Appendix F to implement this guidance in
accordance with Executive Order 14028,
Improving the Nation’s Cybersecurity.
22
SP 800-53r5 Control Number and Name Applicable to SP 800-161r1
Cybersecurity Supply Chain Risk Management
SR-8 Notification Agreements With the Prevalent Platform, you can collaborate on
documents, agreements and certifications, such as NDAs,
Supplemental C-SCRM Guidance: At
SLAs, SOWs and contracts, with built-in version control,
minimum, enterprises should require
task assignment and auto-review cadences. Manage all
their suppliers to establish notification
documents throughout the vendor lifecycle in centralized
agreements with entities within
vendor profiles.
their supply chain that have a role or
responsibility related to that critical
service or product. Departments and
agencies should refer to Appendix F to
implement this guidance in accordance
with Executive Order 14028, Improving
the Nation’s Cybersecurity.
23
Summary Guidelines and Recommendations
To address the supply chain risk management control requirements established in SP 800-53, use the
Cybersecurity Framework v1.1 supplemental guidance and consider implementing the following practices.
Identify, establish, assess, and Define and document your third-party risk management
manage cyber supply chain program with expert professional services. Obtain a clear plan
risk management processes, that accounts for your specific needs while incorporating best
and ensuring organizational practices for end-to-end TPRM.
stakeholders agree.
Identify, prioritize, and assess Onboard, profile, tier and score inherent risks across all third
suppliers and third party partners of parties as a critical first step in the onboarding and prioritization
information systems, components, stages of the vendor lifecycle.
and services using a cyber supply
chain risk assessment process.
Implement appropriate measures Use dedicated and custom contract assessment questionnaires
in supplier and third-party partner to enable comprehensive reviews by identifying potential
contracts to meet the objectives breaches of contract and other risks. Customizable surveys
of an organization’s cybersecurity make it easy to gather and analyze necessary performance and
program and Cyber Supply Chain contract data in a single risk register.
Risk Management Plan.
Routinely assess suppliers and third- Use a comprehensive solution to address all information security
party partners using audits, test topics as they pertain to supply chain partner
results, or other forms of evaluations security controls.
to confirm they are meeting their
contractual obligations.
Conduct response and recovery Identify and mitigate the impact supply chain breaches by
planning and testing with suppliers centrally managing vendors, conducting proactive event
and third-party providers. assessments, scoring identified risks, and accessing
remediation guidance.
24
The Prevalent Difference
NIST requires robust management and tracking of third-party supply chain security risks. SP 800-53,
SP 800-161, and CSF v1.1 specify that a policy for managing risk should be in place; security controls should
be selected; a policy should be codified in supplier agreements where appropriate; and suppliers should
be managed and audited to the requirements and controls. In short, organizations need to establish and
implement the processes to identify, assess and manage supply chain risk.
• Continuously monitoring your third parties for cybersecurity, business, reputational or financial risks that
can impact their ability to deliver products and services
• Delivering the reporting required to demonstrate compliance inside and outside the organization
• Accelerating incident response by rapidly identifying and mitigating the impact of supply chain breaches
through event collection, scoring identified risks, and accessing remediation guidance
Contact Prevalent for a free maturity assessment to determine how your current TPRM policies stack
up to NIST requirements or request a solution demo today.
25
About Prevalent
Prevalent takes the pain out of third-party risk management (TPRM). Companies use our software and
services to eliminate the security and compliance exposures that come from working with vendors and
suppliers throughout the third-party lifecycle. Our customers benefit from a flexible, hybrid approach
to TPRM, where they not only gain solutions tailored to their needs, but also realize a rapid return on
investment. Regardless of where they start, we help our customers stop the pain, make informed decisions,
and adapt and mature their TPRM programs over time.
© Prevalent, Inc. All rights reserved. The Prevalent name and logo are trademarks or registered trademarks of Prevalent, Inc.
All other trademarks are the property of their respective owners. 6/22
26