SAMMY UI is optimized for resolutions with a width 1024px and higher.
Post-Agreement Activities Planning
GV.SC-10: Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement
  • Ex1:  Establish processes for terminating critical relationships under both normal and adverse circumstances
  • Ex2:  Define and implement plans for component end-of-life maintenance support and obsolescence
  • Ex3:  Verify that supplier access to organization resources is deactivated promptly when it is no longer needed
  • Ex4:  Verify that assets containing the organization’s data are returned or properly disposed of in a timely, controlled, and safe manner
  • Ex5:  Develop and execute a plan for terminating or transitioning supplier relationships that takes supply chain security risk and resiliency into account
  • Ex6:  Mitigate risks to data and systems created by supplier termination
  • Ex7:  Manage data leakage risks associated with supplier termination
Tier
Not Applicable - Not applicable
No - The outcome(s) have not been meaningfully implemented.
Tier 1: Partial - Application of the organizational cybersecurity risk strategy is managed in an ad hoc manner. Prioritization is ad hoc and not formally based on objectives or threat environment.
Tier 2: Risk Informed - Risk management practices are approved by management but may not be established as organization-wide policy. The prioritization of cybersecurity activities and protection needs is directly informed by organizational risk objectives, the threat environment, or business/mission requirements.
Tier 3: Repeatable - The organization’s risk management practices are formally approved and expressed as policy. Risk-informed policies, processes, and procedures are defined, implemented as intended, and reviewed. Organizational cybersecurity practices are regularly updated based on the application of risk management processes to changes in business/mission requirements, threats, and technological landscape.
Tier 4: Adaptive - There is an organization-wide approach to managing cybersecurity risks that uses risk-informed policies, processes, and procedures to address potential cybersecurity events.
Description

Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement