top of page

ISO 27001 Control 5.21: Managing Information Security in The ICT Supply Chain

Managing Information Security in the ICT Supply Chain

Modern organisations rely heavily on ICT products and services to maintain seamless operations, but this dependency introduces risks associated with the supply chain. By defining and implementing robust processes, organisations can mitigate these risks while fostering trusted relationships with their suppliers.


Purpose of ICT Supply Chain Security

The purpose of managing information security in the ICT supply chain is to:

  • Maintain an agreed level of information security in supplier relationships.

  • Protect the organisation’s information and associated assets from supply chain vulnerabilities.

  • Ensure compliance with security standards and best practices throughout the supply chain.


Core Elements of ICT Supply Chain Security

Organisations should consider the following elements to strengthen ICT supply chain security:


1. Security Requirements for ICT Acquisitions

  • Define specific information security requirements for ICT products and services before acquisition.

  • Ensure suppliers adhere to these security requirements throughout their operations.


2. Propagating Security Standards

  • Require suppliers to propagate the organisation’s security standards to their subcontractors.

  • Ensure security practices are upheld throughout the supply chain, including sub-contracted developers and hardware providers.


3. Product and Service Transparency

  • Request suppliers to provide detailed information about the software components and security functions of their products.

  • Validate the configuration needed for secure operation.


4. Monitoring and Validation

  • Implement processes to monitor and validate supplier compliance with stated security requirements.

  • Conduct regular penetration testing, independent audits, and third-party attestations.


5. Critical Component Traceability

  • Identify and document critical components essential for maintaining functionality.

  • Ensure their origin and authenticity can be traced throughout the supply chain.


Additional Measures for ICT Supply Chain Security


1. Anti-Tamper and Detection Mechanisms

  • Use anti-tamper labels, cryptographic hashes, or digital signatures to verify the authenticity of components.

  • Monitor for out-of-specification performance, which may indicate tampering or counterfeit components.


2. Certification and Evaluation

  • Obtain assurance that ICT products meet required security levels through certification schemes, such as the Common Criteria Recognition Arrangement.


3. Life Cycle Management

  • Manage risks associated with the life cycle of ICT components, including end-of-life scenarios where suppliers may discontinue components.

  • Establish contingency plans, such as identifying alternative suppliers and transferring necessary software and expertise.


4. Communication and Incident Sharing

  • Define clear rules for sharing information about supply chain issues and compromises with suppliers.

  • Establish communication protocols for addressing incidents promptly and collaboratively.


ICT Supply Chain Risk Management in Practice

Examples of ICT supply chain scenarios include:

  • Cloud Services: Providers rely on software developers, telecommunication services, and hardware providers.

  • IoT Ecosystems: These involve device manufacturers, cloud platform operators, mobile application developers, and software library vendors.

  • Hosting Services: Providers may depend on external service desks, spanning multiple support levels.


Organisations can influence supply chain security by clearly defining requirements in supplier agreements and choosing reputable vendors. Leveraging standards such as ISO/IEC 27036-3 for supply chain risk assessment and ISO/IEC 19770-2 for software identification tags can further enhance security.


Conclusion

Securing the ICT supply chain is a critical aspect of modern organisational resilience. By implementing structured processes, validating supplier practices, and establishing robust communication channels, organisations can mitigate risks while ensuring operational continuity.

Proactive management and adherence to international standards strengthen the overall security posture, fostering trust and reliability in the supply chain.

Commentaires


image.png

Play Crossy Chicken

Never miss another article.

About the author

Alan Parker is an IT consultant and project manager who specialises in IT governance, process implementation, and project delivery. With over 30 years of experience in the industry, Alan believes that simplifying complex challenges and avoiding pitfalls are key to successful IT management. He has led various IT teams and projects across multiple organisations, continually honing his expertise in ITIL and PRINCE2 methodologies. Alan holds a degree in Information Systems and has been recognised for his ability to deliver reliable and effective IT solutions. He lives in Berkshire, UK, with his family.

bottom of page