Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • NIST SP 800-161r1: What You Need to Know
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

NIST SP 800-161r1: What You Need to Know

4 years ago Tripwire Guest Authors
NIST SP 800-161r1: What You Need to Know

Modern goods and services rely on a supply chain ecosystem, which are interconnected networks of manufacturers, software developers, and other service providers. This ecosystem provides cost savings, interoperability, quick innovation, product feature diversity, and the freedom to pick between rival providers. However, due to the many sources of components and software that often form a final product, supply chains carry inherent cybersecurity risks.

Organizations need to be aware of the risks associated with goods and services that may include potentially harmful functionality, counterfeiting, or susceptibility to other vulnerabilities as a result of poor manufacturing and development procedures throughout the supply chain.

The National Institute of Standards and Technology (NIST) has revised its Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations publication. The document, found under the heading, Special Publication 800-161r1SP revises the guidelines for recognizing, analyzing, and reacting to cybersecurity threats across the supply chain at all organizational levels. It helps NIST meet its duties under the 2021 Executive Order on Improving the Nation’s Cybersecurity, which tackles the rise of software security vulnerabilities across the supply chain.

Cybersecurity Supply Chain Risk Management (C-SCRM)

Since 2008, NIST has performed research and cooperated with a vast number and range of stakeholders to provide information resources that assist businesses with their Cybersecurity Supply Chain Risk Management (C-SCRM). This initiative is aimed at helping businesses to manage cybersecurity threats across their supply chains. Statutorily, federal agencies are required to use NIST’s C-SCRM and other cybersecurity standards and recommendations to secure non-national security information and communications infrastructure. The SECURE Technology Act and FASC Rule provided the NIST with special authority to draft C-SCRM recommendations.

In the cybersecurity-related parts of the supply chain, potential risks include the introduction of counterfeits, illegal production, tampering, theft, the insertion of harmful software and hardware, and poor manufacturing and development procedures.  The goal of supply chain management as it relates to cybersecurity risks includes maintaining the integrity, security, quality, and resilience of the entire chain and its goods and services. C-SCRM  looks at a supply chain system’s whole life cycle, including design, development, distribution, deployment, acquisition, maintenance, and destruction.

NIST Special Publication 800-161r1

This revised publication updates guidance on identifying, assessing, and responding to cybersecurity risks across an organization’s entire supply chain. The publication provides critical principles for organizations to implement as they build their capacity to handle cybersecurity risks. It also alerts organizations to consider the vulnerabilities, not just of a finished product they might use, but also of each of its parts, which might have been made somewhere else, and the path those parts took to get to their final destination.

The new C-SCRM guideline covers a vast variety of stakeholder groups, including information security, privacy, system development and implementation, acquisition, procurement, legal, and human resources. C-SCRM includes activities from the beginning of a system’s development life cycle, through the end of the system’s life.

The core audience for the revised publication consists of buyers and final consumers of goods, software, and services. The guideline helps organizations include cybersecurity supply chain risk concerns and regulations into their purchasing procedures and emphasizes the need of monitoring for risks. Due to the fact that cybersecurity risks may develop at any stage of a product’s life cycle or supply chain, the guideline now takes into account possible vulnerabilities, such as the sources of code inside a product or the merchants that carry it.

In Conclusion:

The supply chain is a weak point in international trade. It allows technology developers and suppliers to build and deliver novel solutions, but it may leave companies, their final products, and eventually customers vulnerable to cyberattacks.

Managing supply chain cybersecurity is an ongoing necessity, and if your organization hasn’t begun, there is a complete solution that may help you get started right away. The C-SCRM publication now includes essential practices that businesses may use to improve their capacity to manage cybersecurity risks inside and across their supply chains.

It encourages organizations to reconsider the vulnerabilities of a final product they’re contemplating employing, as well as the vulnerabilities of its components, which may have been produced elsewhere, and the path those components traveled to get there.


About the Author: Josephine Uba has written blog posts and guides on Cybersecurity, cryptocurrencies, cyber laws and cybercrimes, which has gained her recognition as a thought leader in these fields especially under Nigerian jurisdiction. She earned the Mondaq Thought Leadership Award in 2021 and recently won the Nigeria Overall Mondaq Thought Leadership Award in 2022 solely by writing on these topics.

Editor’s Note: The opinions expressed in this and other guest author articles are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” NIST SP 800-161r1: What You Need to Know” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Compliance, Critical Severity, Goverment, Privacy, TripWire

Continue Reading

Previous Modern IT Security Teams’ Inevitable Need for Advanced Vulnerability Management
Next RIG Exploit Kit Now Infects Victims’ PCs With Dridex Instead of Raccoon Stealer

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

8 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

9 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

11 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

13 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

15 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

17 hours ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT