Under active development Content is continuously updated and improved

RA-5(3)Breadth And Depth Of Coverage

>Control Description

Enterprises that monitor the supply chain for vulnerabilities should express the breadth of monitoring based on the criticality and/or risk profile of the supplier or product/component and the depth of monitoring based on the level of the supply chain at which the monitoring takes place (e.g., sub-supplier). Where possible, a component inventory (e.g., hardware, software) may aid enterprises in capturing the breadth and depth of the products/components within their supply chain that may need to be monitored and scanned for vulnerabilities

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.