Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
GV.SC-06.1: Planning and due diligence shall be carried out to reduce risks before entering into formal relationships with suppliers or other third parties. |
|
GV.SC-06.1 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p37 |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
A general note, for any purpose. |
<div><p>The goal of this control is to reduce cybersecurity and operational risks by ensuring that appropriate planning and due diligence are conducted before entering into formal relationships with suppliers or third parties. To achieve this goal:</p><ul><li>Risk-Based Due Diligence Due diligence should be performed on prospective suppliers in line with the organisation’s procurement policy and scaled to the level of risk, criticality, and complexity of the relationship.</li><li>Cybersecurity and Risk CapabilityAssessment The cybersecurity maturity, risk management practices, and OT-specific capabilities of suppliers should be evaluated for suitability.</li><li>Supplier Risk Assessments Risk assessments should be conducted to ensure alignment with business needs and applicable cybersecurity requirements, including those relevant to OT environments.</li><li>Product Integrity and Security The authenticity, integrity, and security of critical products and components should be verified before acquisition and deployment, especiallyin OTsystemswherevulnerabilities can impact safetyand operations.</li></ul></div> |
|
A general note, for any purpose. |
The goal of this control is to reduce cybersecurity and operational risks by ensuring that appropriate planning and due diligence are conducted before entering into formal relationships with suppliers or third parties. To achieve this goal: • Risk-Based Due Diligence Due diligence should be performed on prospective suppliers in line with the organisation’s procurement policy and scaled to the level of risk, criticality, and complexity of the relationship. • Cybersecurity and Risk CapabilityAssessment The cybersecurity maturity, risk management practices, and OT-specific capabilities of suppliers should be evaluated for suitability. • Supplier Risk Assessments Risk assessments should be conducted to ensure alignment with business needs and applicable cybersecurity requirements, including those relevant to OT environments. • Product Integrity and Security The authenticity, integrity, and security of critical products and components should be verified before acquisition and deployment, especiallyin OTsystemswherevulnerabilities can impact safetyand operations. |
|
A general note, for any purpose. |
The goal of this control is to reduce cybersecurity and operational risks by ensuring that appropriate planning and due diligence are conducted before entering into formal relationships with suppliers or third parties. To achieve this goal: - Risk-Based Due Diligence Due diligence should be performed on prospective suppliers in line with the organisation’s procurement policy and scaled to the level of risk, criticality, and complexity of the relationship. - Cybersecurity and Risk CapabilityAssessment The cybersecurity maturity, risk management practices, and OT-specific capabilities of suppliers should be evaluated for suitability. - Supplier Risk Assessments Risk assessments should be conducted to ensure alignment with business needs and applicable cybersecurity requirements, including those relevant to OT environments. - Product Integrity and Security The authenticity, integrity, and security of critical products and components should be verified before acquisition and deployment, especiallyin OTsystemswherevulnerabilities can impact safetyand operations. |
|
A general note, for any purpose. |
The goal of this control is to reduce cybersecurity and operational risks by ensuring that appropriate planning and due diligence are conducted before entering into formal relationships with suppliers or third parties. To achieve this goal: - Risk-Based Due Diligence Due diligence should be performed on prospective suppliers in line with the organisation’s procurement policy and scaled to the level of risk, criticality, and complexity of the relationship. - Cybersecurity and Risk CapabilityAssessment The cybersecurity maturity, risk management practices, and OT-specific capabilities of suppliers should be evaluated for suitability. - Supplier Risk Assessments Risk assessments should be conducted to ensure alignment with business needs and applicable cybersecurity requirements, including those relevant to OT environments. - Product Integrity and Security The authenticity, integrity, and security of critical products and components should be verified before acquisition and deployment, especiallyin OTsystemswherevulnerabilities can impact safetyand operations. |
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
GV.SC-06.1 |
|
skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties. |
Supplier due diligence |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
Planning and due diligence shall be carried out to reduce risks before entering into formal relationships with suppliers or other third parties. |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
The number of triples associated with the subject. |
17 |
|
Specifies the dataset the subject is part of. |
Resultaten 1 - 19 of 19
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more specific in meaning. |
Resultaten 1 - 1 of 1