CAF Outcome A4.a: Supply Chain

From the UK NCSC's Cyber Assessment Framework (version 3.1):

The organisation understands and manages security risks to networks and information systems supporting the operation of essential functions that arise as a result of dependencies on external suppliers. This includes ensuring that appropriate measures are employed where third party services are used.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

NCSC CAF Mapped to NIST CSF

A4.a: Supply Chain to CSF mappings generated from UK Cabinet Office table.

ATT&CK Mitigations

MITRE ATT&CK mitigations which map to this CAF outcome, based on mappings by Ofgem.

Related ISO 27001 Controls

Clauses and controls from ISO 27001 (2013) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Addressing security within supplier agreements (15.1.2)
    ISO 27001:2013
  • Security of network services (13.1.2)
    ISO 27001:2013
  • Agreements on information transfer (13.2.2)
    ISO 27001:2013
  • Information and communication technology supply chain (15.1.3)
    ISO 27001:2013
  • Monitoring and review of supplier services (15.2.1)
    ISO 27001:2013
  • Managing changes to supplier services (15.2.2)
    ISO 27001:2013
  • Outsourced development (14.2.7)
    ISO 27001:2013
  • Information security policy for supplier relationships (15.1.1)
    ISO 27001:2013

Related SP800-53 Controls

Generated from NISTs SP800-53/CSF Crosswalk mappings.

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against. This is based on the above mappings to ATT&CK mitigations by Ofgem.