The National Institute of Standards and Technology (NIST) has produced several publications addressing the different components of information security within the NIST 800 computer security series. Compliance across this entire NIST 800 series is expected for all internal and external service providers of government entities - such as the DoD federal agencies. Though not obliged to comply, many private organizations use the NIST 800 series as a maturity model for achieving a minimal baseline of cybersecurity, especially in the area of supply chain risk management (SCRM).
NIST has produced three special publications focused on mitigating supply chain attacks:
The original NIST SP 800-161 publication can be accessed here.
This post will focus on the NIST 800-161 special publication and explain how its third-party risks mitigation metrics can be addressed.
What’s the Difference Between NIST 800-53 and NIST 800-161?
NIST 800-53 is the foundational framework for all security controls within the NIST 800 series. NIST 800-161 is considered a complementary addition to this foundation to further mature supply chain security programs. In other words, the NIST 800-53 framework is a prerequisite to the NIST 800-161 framework.
Implementing both risk management frameworks in SCRM programs is recommended for all businesses in public and private sectors. This will establish the most comprehensive template for mitigating ICT supply chain risks in business processes.
However, all information and communication technology ecosystems can benefit from the risk management programs presented in special publication 800-161.
Meeting Third-Party Risk Mitigation Requirements in NIST SP 800-161 with UpGuard
Because NIST 800-53 is a foundational framework for NIST SP 800-161, there’s an overlap between the security requirements of both frameworks.
Even with the exclusion of this overlap, the remaining list of ICT SCRM control is lengthy, and it would be inefficient to map compliance efforts to each individual control.
Instead, compliance is most efficiently achieved by following best cyber supply chain risk management practices.
Some suggested supply chain risk management practices for federal information systems and organizations are outlined below:
Continuous monitoring of cybersecurity risks in the supply chain - Real-time tracking of attack surface exploits empowers organizations to address supply chain security risks before cybercriminals exploit them.
UpGuard scans the entire third-party attack surface for security vulnerabilities that could facilitate supply chain attacks. Click here to learn more.
Third-party risk remediation validation - Security ratings confirm vendors follow through with requested risk management processes. Security ratings also ensure service providers meet their contractual obligations to safeguard critical information.
UpGuard assigns each third-party vendor a security rating based on over 70 attack vectors. Click here to learn more about security ratings.
Security questionnaire automation - Automate supply chain risk assessments mapping to regulatory and industry standards, such as ISO/IEC 27001, NIST, COBIT, and ISA.
UpGuard offers an extensive library of security questionnaires, mapping to popular cybersecurity frameworks and standards. The following list of questionnaires are available on the UpGuard platform:
Implement a Third-Party Risk Management Program (TPRM) - A TPRM will address the complete domain of third-party risk mitigation, including third-party assessments and regulatory requirements tracking. Outsourcing this effort to a TPRM service provider is becoming an increasingly popular decision amongst stakeholders seeking a scalable TPRM model.
Rank third-party vendors by risk criticality - Prioritizing vendors with the most significant potential impact on security postures could significantly reduce the success rates of supply chain cyberattacks.
UpGuard offers a Vendor Tiering feature to help you rank vendors based on their potential degree of impact on security postures.
Regularly update and test response plans - Response plans should be regularly exercised with unexpected penetration testing.
Broaden the scope of vendor security information sharing - For the most accurate evaluation of an organization’s risk profile, risk assessments should be customizable. This will accommodate for the unique supply chain security objectives of critical infrastructures and privacy controls.
Detect and shut down third-party data leaks - Data leaks help cybercriminals gain unauthorized access to vendors in the supply chain. UpGuard’s proprietary data leak detection engine discovers overlooked exposures across common hosts of data leak dumps, including dark web forums. Click here to learn more about data leaks.
Secure the vendor onboarding process - The vendor procurement process significantly impacts security posture. As a result, the risk profiles of prospective vendors should be heavily scrutinized - an effort that should continue throughout the entire lifecycle of all vendors.