GV.SC-03—Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes
>Control Description
This cybersecurity supply chain risk management subcategory ensures that cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes. Key activities include: Identify areas of alignment and overlap with cybersecurity and enterprise risk management; Establish integrated control sets for cybersecurity risk management and cybersecurity supply chain risk management; Integrate cybersecurity supply chain risk management into improvement processes.
>Cross-Framework Mappings
NIST SP 800-53 r5
via NIST CSF 2.0 Concept CrosswalkAC-01
CompareAT-01
CompareAU-01
CompareCA-01
CompareCM-01
CompareCP-01
CompareIA-01
CompareIR-01
CompareMA-01
CompareMP-01
ComparePE-01
ComparePL-01
ComparePM-01
ComparePM-09
ComparePM-18
ComparePM-30
ComparePM-31
ComparePS-01
ComparePT-01
CompareRA-01
CompareRA-03
CompareRA-07
CompareSA-01
CompareSC-01
CompareSI-01
CompareSR-01
CompareSR-02
CompareSR-03
ComparePCI DSS v4.0.1
via NIST OLIR Catalog>Informative References
Official NIST mappings to external frameworks and standards. Source: NIST CSF 2.0
CCMv4.0
STA-01
STA-06
STA-08
STA-11
STA-12
UEM-14
CRI Profile v2.0
GV.SC-03
GV.SC-03.01
CSF v1.1
ID.SC-2
CoP
A4
ISO/IEC 27001:2022
Mandatory Clause: 8.1
Annex A Controls: 5.1
Annex A Controls: 5.19
Annex A Controls: 5.20
Annex A Controls: 5.21
NICE Framework
OG-WRL-002
OG-WRL-009
OG-WRL-012
OG-WRL-015
OG-WRL-016
PCI DSS
6.4.3
6.2.3
12.8.3
12.3.4
11.6.1
6.3.2
6.3.1
SCF
GOV-01
GOV-02
RSK-01
RSK-09
SP 800-171 Rev 3
03.11.01
03.11.04
03.15.01
03.17.01
03.17.03
SP 800-218
PW.4.1
SP 800-221A
GV.CT-2
GV.CT-3
SP 800-53 Rev 5.1.1
AC-01
AT-01
AU-01
CA-01
CM-01
CP-01
IA-01
IR-01
+20 more
SP 800-53 Rev 5.2.0
AC-01
AT-01
AU-01
CA-01
CM-01
CP-01
IA-01
IR-01
+20 more
SP-800-37 Rev 2
RMF Prepare Step (Organization & Mission/Business Levels): TASK P-2 Risk Management Strategy
Ask AI
Configure your API key to use AI features.