RA-3(1)—Risk Assessment | Supply Chain Risk Assessment
>Control Description
>DoD Impact Level Requirements
No specific parameter values or requirements for this impact level.
>Discussion
Supply chain-related events include disruption, use of defective components, insertion of counterfeits, theft, malicious development practices, improper delivery practices, and insertion of malicious code. These events can have a significant impact on the confidentiality, integrity, or availability of a system and its information and, therefore, can also adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation. The supply chain-related events may be unintentional or malicious and can occur at any point during the system life cycle.
An analysis of supply chain risk can help an organization identify systems or components for which additional supply chain risk mitigations are required.
>Programmatic Queries
Related Services
CLI Commands
aws securityhub enable-security-hub --region us-east-1aws configservice put-configuration-aggregator --configuration-aggregator-name supply-chain-agg --account-aggregation-sources '[{AllAwsRegions=true,AwsRegions=[us-east-1,us-west-2],AccountIds=[123456789012,210987654321]}]'aws servicecatalog create-product --name 'Compliant Supplier Service' --product-type CLOUD_FORMATION_TEMPLATE --provisioning-artifact-parameters file://artifact.jsonaws securityhub get-findings --filters '[{Key=ProductName,Value=AWS::SupplyChain,Comparison=EQUALS}]'>Related Controls
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What is your organization's documented risk assessment policy and how does it address the requirements of RA-3(1)?
- •Who has been designated as responsible for conducting and maintaining risk assessments?
- •How frequently are risk assessments conducted and what triggers an update to the risk assessment?
Technical Implementation:
- •What methodology or framework do you use to conduct risk assessments?
- •How do you identify and categorize threats and vulnerabilities during the risk assessment process?
- •What tools or systems support your risk assessment activities?
Evidence & Documentation:
- •Can you provide the most recent risk assessment report?
- •What evidence demonstrates that risk assessment findings are communicated to appropriate stakeholders?
- •Where are risk assessment results documented and how long are they retained?
Ask AI
Configure your API key to use AI features.