SR · Plan wizard

Supply Chain Risk Management Plan

Documents how supply-chain risk is identified, assessed, and mitigated across the system's lifecycle. Covers SCRM plan governance, processes for managing supply-chain risk, acquisition strategies that select trustworthy suppliers, supplier assessments and reviews, notification agreements, inspection of received components, anti-counterfeit / authenticity controls, and component disposal. Covers the controls of the SR family in NIST SP 800-53 r5 and aligns with NIST SP 800-161 r1 (Cybersecurity Supply Chain Risk Management Practices), NIST SP 800-53A r5 (Assessment), Executive Order 14028, OMB M-22-18 / M-23-16 (software supply chain), Section 889 of the FY2019 NDAA (covered telecommunications), CISA ICT-SCRM Task Force guidance, and FedRAMP Continuous Monitoring requirements.

1
Full official name of the information system.
Short identifier used in headings and references.
Role or named individual accountable for the system.
Describe what falls inside the authorization boundary - components, services, networks, data flows.
2
Determines which controls in this family appear in your plan.
3
Approach basics → §4.x

Roles and tooling that anchor the rest of the plan.

Role / team accountable for SCRM (e.g., 'Agency C-SCRM Office', 'Internal SCRM Working Group chaired by CISO + Procurement Lead', 'ISSO with quarterly review by ITRM committee').
Where the SCRM Plan itself is maintained (typically alongside the SSP — e.g., 'eMASS package PKG-12345 SCRM annex', '/repo/compliance/scrm-plan.md').
Where vendor-risk-rating is conducted (e.g., 'Internal review + BitSight + SecurityScorecard', 'Archer Vendor Risk module', 'CISO-led annual vendor review with Procurement support').
Tool that ingests and analyzes received SBOMs (e.g., 'OWASP Dependency-Track', 'Anchore Enterprise', 'Mend SCA + custom ingestion').
SCRM Plan (SR-2) → §4.x

How the SCRM Plan itself is governed.

What the SCRM Plan covers (organizational responsibilities, in-scope suppliers / categories, risk methodology cross-reference to RA-3(1), incident protocols, plan revision schedule). Reference NIST SP 800-161 r1 Appendix B.
How often the SCRM Plan is reviewed and updated (typical: 'Annually + on significant change to supplier mix or threat environment'). SR-2 ODV.
Per SR-2(1) — establish a dedicated supply-chain risk-management team. Document team membership, charter, decision authority.
Supply Chain Controls and Processes (SR-3) → §4.x

Risk-mitigation processes applied across the supply chain.

Acquisition Strategies (SR-5) → §4.x

Selection of trustworthy suppliers.

How candidate suppliers are evaluated. Scoring matrix, weight per criterion, decision authority. Reference NIST SP 800-161 r1 Appendix C.
Where the approved-supplier / trusted-supplier list is maintained.
When source-diversity (multiple suppliers per critical component class) is required vs allowed-single-source. Risk-acceptance pathway for unavoidable single-source dependencies.
Supplier Assessments and Reviews (SR-6) → §4.x

Ongoing supplier-risk monitoring.

How often suppliers are reassessed. Tier-based (e.g., 'Critical suppliers: continuous + quarterly formal; high-risk: semi-annual; standard: annual').
Workflow when a supplier assessment identifies elevated risk. Acceptable-risk pathway, mitigation requirements, exit / replacement consideration.
Who is on the critical-supplier register and why. Reference RA-9 criticality analysis.
Notification Agreements (SR-8) → §4.x

Contractual obligations for supplier disclosure.

Time-to-notify by event class. Common: 'Cyber incidents: 24-72h per CISA / DFARS guidelines'; 'Vulnerabilities: per coordinated disclosure timeline'.
Pointer to the standard contract-clause language that imposes notification obligations.
Where notifications received from suppliers are routed internally (typically: SOC + ISSO + IR team). Reference IR plan.
Component Inspection (SR-10) → §4.x

Inspection of components upon receipt.

What happens when inspection reveals a problem. Component quarantine, supplier escalation, IR activation. Coordination with CISA-DHS.
Authenticity and Anti-Counterfeit (SR-11) → §4.x

Protection against counterfeit components.

Per SR-11(1) — training for personnel involved in receipt / inspection / disposal of components. Reference AT-3 role-based training.
Per SR-11(2) — verifying components are obtained from authorized suppliers / authorized resellers. Maintaining the chain back to the OEM.
Where suspected-counterfeit findings are recorded and tracked.
Component Disposal (SR-12) → §4.x

Lifecycle disposition of supply-chain components.

How disposal is executed. Coordination with MP-6 sanitization (for media-bearing components), PE-16 removal, vendor RMA workflow with required sanitization. Reference NIST SP 800-88 r1.
Whether and when chain-of-custody documentation is required for disposal. Especially relevant for cryptographic-module-bearing components and classified-system components.
Supply-Chain Scope and Coverage → §2.x

Quantitative scope numbers that anchor metrics later in the plan.

Approximate count of active suppliers in scope of SR program.
Approximate count of suppliers classified as critical (per SR-3 / RA-9).
Approximate count of OSS components tracked through SBOM analysis.
Approximate count of components received per quarter (anchors SR-10 inspection effort).
SCRM Metrics & KPIs → §6.x

Metrics tracked to demonstrate SR control effectiveness.

    Suggested:
    Vendor-Incident Notification Handling → §6.x

    Continuous handling of supplier disclosures.

    Who triages received vendor notifications (typically SOC dispatcher or IR analyst-on-call).
    How vendor-incident notifications become incidents in the IR plan workflow. Severity determination, escalation criteria.
    Cross-references to other RMF artifacts → §7

    Where this plan plugs into the broader RMF package.

    Where in the SSP the SR control implementations are summarized (e.g., 'SSP §13.16').
    Convention for SR-related POA&M items (e.g., 'POAM-SR-' for general).
    How RA-3(1) supply-chain risk assessment triggers SR program activity. How RA-9 criticality classification feeds SR-3 critical-supplier register.
    How SA-4 acquisition clauses contractually impose SR requirements; SA-9 external-services governance overlap with SR-3 / SR-5; SA-15(3) criticality echo with SR-3.
    How SR-10 inspection results feed CM-2 baseline integrity. Component-tampering finding triggers CM-4 / CM-5 review.
    How vendor-incident notifications become IR-plan events. How counterfeit-component detection escalates.
    How SR-supplied artifact authenticity (SBOM, signed packages, attestations) feeds SI-7 integrity verification.
    Pointer to the CA-7 monitoring strategy document tying SR continuous-monitoring metrics to the broader ConMon plan.
    4

    Pick a baseline in section 2 and the applicable controls will appear here. Each control gets a card with the official text, related controls, linked CCIs, and fields for your implementation status, narrative, responsible role, and evidence.

    5