Acquisition Security Framework: Integration of Supply Chain Risk Management Across the DevSecOps Lifecycle
Loading...
Authors
Woody, Carol
Wallen, Charles
Alberts, Christopher
Bandor, Michael
Subjects
Advisors
Date of Issue
2022-05-02
Date
05/02/22
Publisher
Language
Abstract
Supply chain cyber risks stem from many organizational dependencies—in particular, pro-cessing, transmitting, and storing data; information technology; and communications technolo-gy. These risks are broad, significant, and growing as outsourcing options expand. Important mission capabilities can be undermined by an adversary’s cyber-attack on third parties, even when the organization does not explicitly contract for technology. Virtually all products or ser-vices an organization acquires are supported by or integrate with information technology that in-cludes third-party components/services. Practices critical to monitoring and managing these risks are scattered across the organization, resulting in inconsistencies, gaps, and slow response to disruptions. The Acquisition Security Framework (ASF) contains leading practices to support programs acquiring/building a secure, resilient software-reliant system to manage these risks. It defines the organizational roles that must effectively collaborate to avoid gaps and inconsisten-cies. It also establishes how an organization should ensure effective supply chain risk manage-ment that supports its mission and objectives. The framework contains proven, effective goals and leading practices, and it is consistent with supply chain risk management guidelines from the International Organization for Standardization (ISO), National Institute of Standards and Technol-ogy (NIST), and Department of Homeland Security (DHS).
Type
Conference Paper
Description
Excerpt from the Proceedings of the Nineteenth Annual Acquisition Research Symposium
Series/Report No
Department
Organization
Identifiers
NPS Report Number
SYM-AM-22-045
Sponsors
Funder
Format
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
Copyright is reserved by the copyright owner.