A Guide to Identifying High-Risk Vendors Using NIST CSF 2.0 Activity 2
Now that you have established a strategy for Cybersecurity Supply Chain Risk Management (C-SCRM), the next logical step is to identify exactly who is in your "supply chain ecosystem". As the recent NIST SP 1305 guide points with, you cannot treat every vendor the same way. A cloud provider holding your company’s intellectual property requires much stricter oversight than a vendor providing office furniture.
This process is known as Activity 2: Identifying and Prioritizing Suppliers.










