The program, strategy, objectives, policies, and processes for managing cybersecurity risks in the supply chain are established and accepted by the organization's stakeholders.
Roles and responsibilities regarding cybersecurity for suppliers, clients, and partners are established, communicated, and coordinated internally and externally.
Suppliers are identified and prioritized based on criticality.
Requirements to address cybersecurity risks in the supply chain are established, prioritized and integrated into contracts and other types of agreements with suppliers and other relevant third parties.
The risks posed by a supplier, its products and services, and other third parties are understood, recorded, prioritized, evaluated, managed, and monitored throughout the relationship.