EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.
How EY can help
-
Our Government & Public Sector team can help your federal agency achieve mission success. Find out how.
Read more
Supply chain risk management
NIST 800-53 Revision 5 recently added an entirely new control family focused on supply chain risk management (SCRM). SCRM is a topic that has been brought to the forefront of many IT leaders in the federal government through federal requirements, such as the Federal Acquisition Supply Chain Act, the National Defense Authorization Act of 2019 (Section 889) and Executive Order 13873, along with industry-specific SCRM regulations, such as the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) 13.
Not only has SCRM had legal and regulatory highlights recently, it is also a key area of risk for organizations, whereas 38% of organizations had a data breach caused by a supplier and 52% of organizations had an outage caused by a supplier — both over the past two years (EY Third-Party Risk Management 2019 survey). The inclusion of the SCRM control family will have direct impacts to the risk management framework (RMF) processes and will also challenge cyber professionals to integrate across organizational boundaries and broaden their risk aperture.
To incorporate SCRM within the RMF processes an organization first needs to align the RMF process to the supplier life cycle. Traditional RMF processes initiate after a product is purchased to select, implement, assess and monitor security controls; however, this is too late for SCRM risks as once a product is purchased, an organization has already accepted the risks associated with working with a supplier and their associated supply chain.
To mitigate this, the RMF-associated SCRM processes should be embedded at the onset of a potential procurement to support supplier and supply chain risk assessment capabilities within the pre-procurement (market analysis) and procurement life cycles. By embedding the SCRM controls within the procurement processes, the security team will have visibility to supplier and supply chain risks to support helping leaders make risk-informed decisions, as well as have a starting point, based upon supplier assessments, to support system categorization and control selection.
Effectively reviewing a supplier and their associated supply chain significantly broadens the scope of RMF professionals beyond cybersecurity. In order to review a supplier and understand the risks they present to an organization, an RMF professional must be able to evaluate additional risk elements, such as financial, provenance (a product’s supply chain), foreign interest, compliance and geopolitical risks. These additional risk elements provide the context required to evaluate the overall health of a supplier, their products and their supply chain prior to procurement.
Additionally, SCRM goes well beyond that of a standard system going through the RMF process and should also broaden the scope beyond IT systems to now look at operational technologies, such as bulk electric systems (BES) and the internet of things (IoT) devices, as these devices often have a higher operational impact to an organization in the event they are compromised.