BEAD Cybersecurity and Supply Chain Risk Management Plans
Utah Broadband Center
BEAD Cybersecurity Risk Management Plan Requirements
Cybersecurity Requirements
NIST Framework for Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Functions
CSF Organizational Profiles
CSF Tiers
Tiers characterize the rigor of an organization’s cybersecurity risk governance and management practices, and provide context for how an organization views cybersecurity risks and the processes in place to manage those risks.
Online Resources
Executive Order 14028
NIST Resources
NIST developed additional resources in response to Executive Order 14028. These resources include:
Supply Chain Risk Management Plan Requirements
Supply Chain Risk Management Plan Requirements
NISTIR 8276
Key Practices:
Integrate C-SCRM Across the Organization
Establish a Formal C-SCRM Program
|
|
Establish a Formal C-SCRM Program
Establish a Formal C-SCRM Program
Know and Manage Critical Components & Suppliers
Understand the Organization’s Supply Chain
Closely Collaborate with Key Suppliers
Include Key Suppliers in Resilience & Improvement Activities
Assess & Monitor Throughout Supplier Relationship
Plan for the Full Life Cycle
24 Key Recommendations
24 Key Recommendations
10. Use the Critically Analysis Process Model or BIA to determine supplier criticality
11. Establish visibility into suppliers’ production processes
12. Know if data and infrastructure are available to sub-suppliers
13. Mentor and coach suppliers to improve their cybersecurity practices
14. Require the use of the same standards within your and your suppliers’ organizations
24 Key Recommendations
15. Use assessment questionnaires to influence cybersecurity requirements
16. Include key suppliers in incident response, business continuity, and disaster recovery
17. Maintain a watch list of suppliers who have had issues in the past
18. Establish remediation acceptance criteria for identified risks
19. Establish cyber security requirements through a Security Exhibit, Security Schedule, or Security Addendum document
24 Key Recommendations
20. Establish protocols for vulnerability disclosure and incident notification
21. Establish protocols for communications with external stakeholders during incidents
22. Collaborate on lessons learned and update joint plans
23. Use third-party assessments, site visits, and formal certification to assess critical suppliers
24. Have plans in place for supplied product obsolescence
NIST 800-161 Introduction
Audience Profiles for NIST SP 800
Audience Profiles for NIST SP 800
Audience Profiles for NIST SP 800
Audience Profiles for NIST SP 800
Audience Profiles for NIST SP 800