NIST IR 8276
Key Practices in Cyber Supply Chain
Risk Management :
Observations from Industry
Jon Boyens
Celia Paulsen
Nadya Bartol
Kris Winkler
James Gimbi
This publication is available free of charge from:
https://doi.org/10.6028/ NIST.IR.8276
NISTIR 8276
Key Practices in Cyber Supply Chain
Risk Management:
Observations from Industry
Jon Boyens
Celia Paulsen
Computer Security Division
Information Technology Laboratory
Nadya Bartol
Kris Winkler
James Gimbi
Boston Consulting Group
New York, NY
This publication is available free of charge from:
https://doi.org/10.6028/ NIST.IR.8276
February 2021
U.S. Department of Commerce
Wynn Coggins , Acting Secretary
National Institute of Standards and Technology
James K. Olthoff , Performing the Non -Exclusive Functions and Duties of the Under Secretary of Commerce
for Standards and Technology & Director, National Institute of Standards and Technology National Institute of Standards and Technology Interagency or Internal Report 8276
31 pages ( February 2021)
This publication is available free of charge from:
https://doi.org/10.6028/ NIST.IR.8276
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an
experimental procedure or concept adequately. Such identification is not intended to imply recommendation or
endorsement by NIST, nor is it inte nded to imply that the entities, materials, or equipment are necessarily the best
available for the purpose.
There may be references in this publication to other publications currently under development by NIST in accordance
with its assigned statutory re sponsibilities. The information in this publication, including concepts and methodologies,
may be used by f ederal agencies even before the completion of such companion publications. Thus, until each
publication is completed, current requirements, guideline s, and procedures, where they exist, remain operative. For
planning and transition purposes, f ederal agencies may wish to closely follow the development of these new
publications by NIST.
Organizations are encouraged to review all draft publications duri ng public comment periods and provide feedback to
NIST. Many NIST cybersecurity publications , ot her than the ones noted above, are available at
https://csrc .nist.gov/publications .
Comments on this publication may be submitted to:
National Institute of Standards and Technology
Attn: Computer Security Division, Information Technology Laboratory
100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899 -8930
Email: scrm
[email protected]
All comments are subject to release under the Freedom of Information Act (FOIA).
NISTIR 8276 KEY PRACTICES IN CYBER SCRM:
OBSERVATIONS FROM INDUSTRY
ii
This publication is available free of charge from: https://doi.org/10.6028/ NIST.IR.8276
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and
Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of conce pt implementations, and technical analyses to advance the
development and productive use of information technology. ITL’s responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost -effective security and privacy of other than national s ecurity -related information in f ederal
informa tion systems.
Abstract
In today’s highly connected, interdependent world, all organizations rely on other s for critical
products and services. However, the reality of globalization, while providing many benefits, has
resulted in a world where organizations no longer fully control —and often do not have full
visibi