Supply chain risk management : applying secure acquisition principles to ensure a trusted technology product

Author(s)

Bibliographic Information

Supply chain risk management : applying secure acquisition principles to ensure a trusted technology product

Ken Sigler, Dan Shoemaker, and Anne Kohnke

(Internal audit and IT audit)(An Auerbach book)

CRC Press, c2018

  • : hardback
  • : pbk

Available at  / 2 libraries

Search this Book/Journal

Note

Includes bibliographical references and index

Description and Table of Contents

Description

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

Table of Contents

What Product Risk Is and Why It Needs to be Managed. The Three Constituencies of Product Trust. Building a Standard Acquisition Infrastructure. Risk Management in the ICT Product Chain. Control Formulation and Implementation. Control Sustainment and Operational Assurance. A Capability Maturity Model for Secure Product Acquisition.

by "Nielsen BookData"

Related Books: 1-2 of 2

Details

Page Top