data.gift
  • Datasets

http://cyfun.data.gift/data/requirement_GV_SC_06_1

http://cyfun.data.gift/data/requirement_GV_SC_06_1
Concept

  • http://cyfun.data.gift/data/CyFun2025

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

    • External link
    • Internal link

  • http://cyfun.data.gift/data/subcategory_GV.SC-06

    • External link
    • Internal link

Properties and relations

Direct links from the subject.

Property Value

type

The subject is an instance of a class.

  • External link
  • Internal link

http://cyfun.data.gift/ontology#Requirement

  • External link
  • Internal link

type

The subject is an instance of a class.

  • External link
  • Internal link

Concept

An idea or notion; a unit of thought.

  • External link
  • Internal link

label

A human-readable name for the subject.

  • External link
  • Internal link

GV.SC-06.1: Planning and due diligence shall be carried out to reduce risks before entering into formal relationships with suppliers or other third parties.

http://cyfun.data.gift/ontology#requirementId

  • External link
  • Internal link

GV.SC-06.1

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p37

  • External link
  • Internal link

has broader

Relates a concept to a concept that is more general in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_GV.SC-06

  • External link
  • Internal link

note

A general note, for any purpose.

  • External link
  • Internal link

<div><p>The goal of this control is to reduce cybersecurity and operational risks by ensuring that appropriate planning and due diligence are conducted before entering into formal relationships with suppliers or third parties. To achieve this goal:</p><ul><li>Risk-Based Due Diligence Due diligence should be performed on prospective suppliers in line with the organisation’s procurement policy and scaled to the level of risk, criticality, and complexity of the relationship.</li><li>Cybersecurity and Risk CapabilityAssessment The cybersecurity maturity, risk management practices, and OT-specific capabilities of suppliers should be evaluated for suitability.</li><li>Supplier Risk Assessments Risk assessments should be conducted to ensure alignment with business needs and applicable cybersecurity requirements, including those relevant to OT environments.</li><li>Product Integrity and Security The authenticity, integrity, and security of critical products and components should be verified before acquisition and deployment, especiallyin OTsystemswherevulnerabilities can impact safetyand operations.</li></ul></div>

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to reduce cybersecurity and operational risks by ensuring that appropriate planning and due diligence are conducted before entering into formal relationships with suppliers or third parties. To achieve this goal: • Risk-Based Due Diligence Due diligence should be performed on prospective suppliers in line with the organisation’s procurement policy and scaled to the level of risk, criticality, and complexity of the relationship. • Cybersecurity and Risk CapabilityAssessment The cybersecurity maturity, risk management practices, and OT-specific capabilities of suppliers should be evaluated for suitability. • Supplier Risk Assessments Risk assessments should be conducted to ensure alignment with business needs and applicable cybersecurity requirements, including those relevant to OT environments. • Product Integrity and Security The authenticity, integrity, and security of critical products and components should be verified before acquisition and deployment, especiallyin OTsystemswherevulnerabilities can impact safetyand operations.

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to reduce cybersecurity and operational risks by ensuring that appropriate planning and due diligence are conducted before entering into formal relationships with suppliers or third parties. To achieve this goal: - Risk-Based Due Diligence Due diligence should be performed on prospective suppliers in line with the organisation’s procurement policy and scaled to the level of risk, criticality, and complexity of the relationship. - Cybersecurity and Risk CapabilityAssessment The cybersecurity maturity, risk management practices, and OT-specific capabilities of suppliers should be evaluated for suitability. - Supplier Risk Assessments Risk assessments should be conducted to ensure alignment with business needs and applicable cybersecurity requirements, including those relevant to OT environments. - Product Integrity and Security The authenticity, integrity, and security of critical products and components should be verified before acquisition and deployment, especiallyin OTsystemswherevulnerabilities can impact safetyand operations.

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to reduce cybersecurity and operational risks by ensuring that appropriate planning and due diligence are conducted before entering into formal relationships with suppliers or third parties. To achieve this goal: - Risk-Based Due Diligence Due diligence should be performed on prospective suppliers in line with the organisation’s procurement policy and scaled to the level of risk, criticality, and complexity of the relationship. - Cybersecurity and Risk CapabilityAssessment The cybersecurity maturity, risk management practices, and OT-specific capabilities of suppliers should be evaluated for suitability. - Supplier Risk Assessments Risk assessments should be conducted to ensure alignment with business needs and applicable cybersecurity requirements, including those relevant to OT environments. - Product Integrity and Security The authenticity, integrity, and security of critical products and components should be verified before acquisition and deployment, especiallyin OTsystemswherevulnerabilities can impact safetyand operations.

notation

A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme.

  • External link
  • Internal link

GV.SC-06.1

alternative label

skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties.

  • External link
  • Internal link

Supplier due diligence

preferred label

A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag.

  • External link
  • Internal link

Planning and due diligence shall be carried out to reduce risks before entering into formal relationships with suppliers or other third parties.

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

  • External link
  • Internal link

http://cyfun.data.gift/ontology#level

  • External link
  • Internal link

http://cyfun.data.gift/data/level_ESSENTIAL

  • External link
  • Internal link

triple count

The number of triples associated with the subject.

  • External link
  • Internal link

17

in dataset

Specifies the dataset the subject is part of.

  • External link
  • Internal link

http://data.gift/d/datasets/69E8863AA6CE46D9ACD13109

  • External link
  • Internal link

Resultaten 1 - 19 of 19

References

Inverse links to the subject.

Property Subject

http://cyfun.data.gift/ontology#hasRequirement

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_GV.SC-06

  • External link
  • Internal link

has narrower

Relates a concept to a concept that is more specific in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_GV.SC-06

  • External link
  • Internal link

Resultaten 1 - 1 of 1

© 2024 redpencil.io. All rights reserved.