data.gift
  • Datasets

http://cyfun.data.gift/data/requirement_GV_SC_01_1

http://cyfun.data.gift/data/requirement_GV_SC_01_1
Concept

  • http://cyfun.data.gift/data/CyFun2025

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ManagementAspects

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

    • External link
    • Internal link

  • http://cyfun.data.gift/data/subcategory_GV.SC-01

    • External link
    • Internal link

Properties and relations

Direct links from the subject.

Property Value

type

The subject is an instance of a class.

  • External link
  • Internal link

http://cyfun.data.gift/ontology#Requirement

  • External link
  • Internal link

type

The subject is an instance of a class.

  • External link
  • Internal link

Concept

An idea or notion; a unit of thought.

  • External link
  • Internal link

label

A human-readable name for the subject.

  • External link
  • Internal link

GV.SC-01.1: A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes shall be documented, reviewed, updated when changes occur, and approved by organisational stakeholders.

http://cyfun.data.gift/ontology#requirementId

  • External link
  • Internal link

GV.SC-01.1

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p32

  • External link
  • Internal link

has broader

Relates a concept to a concept that is more general in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_GV.SC-01

  • External link
  • Internal link

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to ensure supply chain cybersecurity risks are proactively managed through a docu- mented, stakeholder-approved, and regularly updated risk management program. The steps below should be considered for organisations to establish a cybersecurity supply chain risk man- agement (C-SCRM) program that is aligned with their strategic objectives and supported by all relevant stakeholders: **Define the Program and Strategy** - IdentifyObjectives:ClearlydefinewhattheorganisationaimstoachievewithitsC-SCRMprogram.Objectives might include protecting against supply chain attacks, ensuring compliance with regulations, and maintaining business continuity. - Develop a Strategy: Outline a high-level strategythat alignswith the organisation's overall cybersecurityand business strategies. This should include risk assessment, risk mitigation, and continuous monitoring plans. **Engage Stakeholders** - IdentifyStakeholders: Determine who the key stakeholders are, including executives, IT, procurement, legal, and compliance teams. - StakeholderInvolvement: Engage stakeholders earlyin the process to ensure theirinput and buy-in.This can be done through workshops, meetings, and regular updates. **Establish Policies and Processes** - Develop Policies: Create comprehensive documented policies that cover all aspects of C-SCRM, including vendor risk management, incident response, and compliance requirements. - Implement Processes: Define and document processes for risk assessment, vendor evaluation, contract management, and incident response. Ensure these processes are integrated into existing business workflows. **Risk Assessment and Management** - Conduct RiskAssessments: Regularly assess risks associated with the supply chain, including potential vul- nerabilities and threats. - MitigateRisks: Develop and implement risk mitigation strategies based on the assessment results.This might include diversifying suppliers, enhancing security controls, and establishing contingency plans. **Continuous Monitoring and Improvement** - Monitor Continuously: Implement continuous monitoring of the supply chain to detect and respond to new risks promptly. This includes monitoring supplier performance and compliance. - Review and Improve: Regularly review the effectiveness of the C-SCRM program and make improvements as needed. This should include feedback from stakeholders and lessons learned from incidents. **Training and Awareness** Educate Employees: Provide training and awareness programs for employees to understand their roles in C-SCRM. This includes recognising supply chain risks and following established policies and procedures. **Documentation and Communication** - Document Everything: Ensure all policies, processes, risk assessments, and mitigation plans are well-docu- mented, kept up to date, approved by relevant management and accessible to relevant stakeholders. - Communicate Effectively: Maintain open lines of communication with stakeholders to keep them informed about the program’s progress, changes, and any incidents that occur.

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to ensure supply chain cybersecurity risks are proactively managed through a docu- mented, stakeholder-approved, and regularly updated risk management program. The steps below should be considered for organisations to establish a cybersecurity supply chain risk man- agement (C-SCRM) program that is aligned with their strategic objectives and supported by all relevant stakeholders: Define the Program and Strategy • IdentifyObjectives:ClearlydefinewhattheorganisationaimstoachievewithitsC-SCRMprogram.Objectives might include protecting against supply chain attacks, ensuring compliance with regulations, and maintaining business continuity. • Develop a Strategy: Outline a high-level strategythat alignswith the organisation's overall cybersecurityand business strategies. This should include risk assessment, risk mitigation, and continuous monitoring plans. Engage Stakeholders • IdentifyStakeholders: Determine who the key stakeholders are, including executives, IT, procurement, legal, and compliance teams. • StakeholderInvolvement: Engage stakeholders earlyin the process to ensure theirinput and buy-in.This can be done through workshops, meetings, and regular updates. Establish Policies and Processes • Develop Policies: Create comprehensive documented policies that cover all aspects of C-SCRM, including vendor risk management, incident response, and compliance requirements. • Implement Processes: Define and document processes for risk assessment, vendor evaluation, contract management, and incident response. Ensure these processes are integrated into existing business workflows. Risk Assessment and Management • Conduct RiskAssessments: Regularly assess risks associated with the supply chain, including potential vul- nerabilities and threats. • MitigateRisks: Develop and implement risk mitigation strategies based on the assessment results.This might include diversifying suppliers, enhancing security controls, and establishing contingency plans. Continuous Monitoring and Improvement • Monitor Continuously: Implement continuous monitoring of the supply chain to detect and respond to new risks promptly. This includes monitoring supplier performance and compliance. • Review and Improve: Regularly review the effectiveness of the C-SCRM program and make improvements as needed. This should include feedback from stakeholders and lessons learned from incidents. Training and Awareness Educate Employees: Provide training and awareness programs for employees to understand their roles in C-SCRM. This includes recognising supply chain risks and following established policies and procedures. Documentation and Communication • Document Everything: Ensure all policies, processes, risk assessments, and mitigation plans are well-docu- mented, kept up to date, approved by relevant management and accessible to relevant stakeholders. • Communicate Effectively: Maintain open lines of communication with stakeholders to keep them informed about the program’s progress, changes, and any incidents that occur.

note

A general note, for any purpose.

  • External link
  • Internal link

<div><p>The goal of this control is to ensure supply chain cybersecurity risks are proactively managed through a docu- mented, stakeholder-approved, and regularly updated risk management program. The steps below should be considered for organisations to establish a cybersecurity supply chain risk man- agement (C-SCRM) program that is aligned with their strategic objectives and supported by all relevant stakeholders:</p><p><strong>Define the Program and Strategy</strong></p><ul><li>IdentifyObjectives:ClearlydefinewhattheorganisationaimstoachievewithitsC-SCRMprogram.Objectives might include protecting against supply chain attacks, ensuring compliance with regulations, and maintaining business continuity.</li><li>Develop a Strategy: Outline a high-level strategythat alignswith the organisation's overall cybersecurityand business strategies. This should include risk assessment, risk mitigation, and continuous monitoring plans.</li></ul><p><strong>Engage Stakeholders</strong></p><ul><li>IdentifyStakeholders: Determine who the key stakeholders are, including executives, IT, procurement, legal, and compliance teams.</li><li>StakeholderInvolvement: Engage stakeholders earlyin the process to ensure theirinput and buy-in.This can be done through workshops, meetings, and regular updates.</li></ul><p><strong>Establish Policies and Processes</strong></p><ul><li>Develop Policies: Create comprehensive documented policies that cover all aspects of C-SCRM, including vendor risk management, incident response, and compliance requirements.</li><li>Implement Processes: Define and document processes for risk assessment, vendor evaluation, contract management, and incident response. Ensure these processes are integrated into existing business workflows.</li></ul><p><strong>Risk Assessment and Management</strong></p><ul><li>Conduct RiskAssessments: Regularly assess risks associated with the supply chain, including potential vul- nerabilities and threats.</li><li>MitigateRisks: Develop and implement risk mitigation strategies based on the assessment results.This might include diversifying suppliers, enhancing security controls, and establishing contingency plans.</li></ul><p><strong>Continuous Monitoring and Improvement</strong></p><ul><li>Monitor Continuously: Implement continuous monitoring of the supply chain to detect and respond to new risks promptly. This includes monitoring supplier performance and compliance.</li><li>Review and Improve: Regularly review the effectiveness of the C-SCRM program and make improvements as needed. This should include feedback from stakeholders and lessons learned from incidents.</li></ul><p><strong>Training and Awareness</strong></p><p>Educate Employees: Provide training and awareness programs for employees to understand their roles in C-SCRM. This includes recognising supply chain risks and following established policies and procedures.</p><p><strong>Documentation and Communication</strong></p><ul><li>Document Everything: Ensure all policies, processes, risk assessments, and mitigation plans are well-docu- mented, kept up to date, approved by relevant management and accessible to relevant stakeholders.</li><li>Communicate Effectively: Maintain open lines of communication with stakeholders to keep them informed about the program’s progress, changes, and any incidents that occur.</li></ul></div>

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to ensure supply chain cybersecurity risks are proactively managed through a docu- mented, stakeholder-approved, and regularly updated risk management program. The steps below should be considered for organisations to establish a cybersecurity supply chain risk man- agement (C-SCRM) program that is aligned with their strategic objectives and supported by all relevant stakeholders: *Define the Program and Strategy* - IdentifyObjectives:ClearlydefinewhattheorganisationaimstoachievewithitsC-SCRMprogram.Objectives might include protecting against supply chain attacks, ensuring compliance with regulations, and maintaining business continuity. - Develop a Strategy: Outline a high-level strategythat alignswith the organisation's overall cybersecurityand business strategies. This should include risk assessment, risk mitigation, and continuous monitoring plans. *Engage Stakeholders* - IdentifyStakeholders: Determine who the key stakeholders are, including executives, IT, procurement, legal, and compliance teams. - StakeholderInvolvement: Engage stakeholders earlyin the process to ensure theirinput and buy-in.This can be done through workshops, meetings, and regular updates. *Establish Policies and Processes* - Develop Policies: Create comprehensive documented policies that cover all aspects of C-SCRM, including vendor risk management, incident response, and compliance requirements. - Implement Processes: Define and document processes for risk assessment, vendor evaluation, contract management, and incident response. Ensure these processes are integrated into existing business workflows. *Risk Assessment and Management* - Conduct RiskAssessments: Regularly assess risks associated with the supply chain, including potential vul- nerabilities and threats. - MitigateRisks: Develop and implement risk mitigation strategies based on the assessment results.This might include diversifying suppliers, enhancing security controls, and establishing contingency plans. *Continuous Monitoring and Improvement* - Monitor Continuously: Implement continuous monitoring of the supply chain to detect and respond to new risks promptly. This includes monitoring supplier performance and compliance. - Review and Improve: Regularly review the effectiveness of the C-SCRM program and make improvements as needed. This should include feedback from stakeholders and lessons learned from incidents. *Training and Awareness* Educate Employees: Provide training and awareness programs for employees to understand their roles in C-SCRM. This includes recognising supply chain risks and following established policies and procedures. *Documentation and Communication* - Document Everything: Ensure all policies, processes, risk assessments, and mitigation plans are well-docu- mented, kept up to date, approved by relevant management and accessible to relevant stakeholders. - Communicate Effectively: Maintain open lines of communication with stakeholders to keep them informed about the program’s progress, changes, and any incidents that occur.

notation

A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme.

  • External link
  • Internal link

GV.SC-01.1

alternative label

skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties.

  • External link
  • Internal link

Supply chain risk management programme

preferred label

A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag.

  • External link
  • Internal link

A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes shall be documented, reviewed, updated when changes occur, and approved by organisational stakeholders.

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ManagementAspects

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

  • External link
  • Internal link

http://cyfun.data.gift/ontology#level

  • External link
  • Internal link

http://cyfun.data.gift/data/level_ESSENTIAL

  • External link
  • Internal link

triple count

The number of triples associated with the subject.

  • External link
  • Internal link

18

in dataset

Specifies the dataset the subject is part of.

  • External link
  • Internal link

http://data.gift/d/datasets/69E8863AA6CE46D9ACD13109

  • External link
  • Internal link

Resultaten 1 - 20 of 20

References

Inverse links to the subject.

Property Subject

http://cyfun.data.gift/ontology#hasRequirement

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_GV.SC-01

  • External link
  • Internal link

has narrower

Relates a concept to a concept that is more specific in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_GV.SC-01

  • External link
  • Internal link

Resultaten 1 - 1 of 1

© 2024 redpencil.io. All rights reserved.