Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains

supply chain illustration

Products from across the world add risk to information communications supply chains.

Credit: ©freshidea-Fotolia_com

The National Institute of Standards and Technology (NIST) has published a second public draft of Supply Chain Risk Management Practices for Federal Information Management Systems and Organizations* for public comment. The new version incorporates changes made in response to comments on the original draft issued Aug. 16, 2013.

Between the growing sophistication and complexity of modern information and communication technology (ICT) and the lengthy and geographically diverse ICT supply chains, important federal information systems are at risk of being compromised by counterfeits, tampering, theft, malicious software and poor manufacturing practices. A counterfeit chip could cause a computer system to break down; malware could lead to loss of critical information.

The NIST guide to securing ICT supply chains details a set of processes for evaluating and managing that risk. "It builds on NIST's Managing Information Security Risk** publication," explains lead author Jon Boyens.

NIST recommends that evaluating ICT supply chains should be part of an organization's overall risk management activities and should involve identifying and assessing applicable risks, determining appropriate mitigating actions, and developing a plan to document mitigating actions and monitoring performance. The plan should be adapted to fit each organization's mission, threats and operating environment, as well as its existing ICT supply chains.

The draft publication also calls for building ICT supply chain risk management activities on existing supply chain and cybersecurity practices, employing an organization-wide approach, and focusing on the systems and components that are most vulnerable and can cause the largest impact if compromised.

The guidance is designed for use with high-impact systems as categorized in NIST's Standards for Security Categorization of Federal Information and Information Systems *** and can be used on moderate systems, if deemed appropriate, Boyens says.

This second public draft is based on an extensive review and comments contributed by the ICT community. NIST is asking for feedback on some of the key changes that appear in this draft, including:

  • Increased emphasis on balancing the risks and costs of ICT supply chain risk management processes and controls throughout the publication,
  • An ICT supply chain risk management controls summary table that provides a baseline and maps to NIST Special Publication 800-53 Revision 4 High baseline controls in Appendix D, and
  • An annotated ICT Supply Chain Risk Management Plan Template in Appendix H.

Supply Chain Risk Management Practices for Federal Information Systems and Organizations, Second Public Draft (NIST SP 800-161) can be downloaded from http://csrc.nist.gov/scrm/publications.html. The public comment period ends July 18, 2-14. Comments may be submitted by email to scrm-nist [at] nist.gov (scrm-nist[at]nist[dot]gov) using the template on the web page.

*J. Boyens, C. Paulsen, R. Moorthy and N. Bartol. Supply Chain Risk Management Practices for Federal Information Management Systems and Organizations. NIST Special Publication 800-161. Second Public Draft. June 2014.Available at http://csrc.nist.gov/publications/drafts/800-161/sp800_161_2nd_draft.pdf.

**Joint Task Force Initiative. Managing Information Security Risk: Organization, Missions, and Information System View. Special Publications 800-39. March 2011. Available at www.nist.gov/manuscript-publication-search.cfm?pub_id=908030.

***NIST's Standards for Security Categorization of Federal Information and Information Systems. Federal Information Processing Standard Publication 199. February 2004.

Released June 3, 2014, Updated February 2, 2023