The Cybersecurity Supply Chain Risk Management (C-SCRM) Questionnaire is a document designed for vendors submitting offers to the government, focusing on their risk management approaches regarding cybersecurity within their supply chains. The questionnaire is structured into three main sections: Contact Information, Vendor Risk Management Plan, and Physical and Personnel Security.
Vendors are required to provide key contact details and respond to specific queries regarding their identification of supply chain threats, mapping of suppliers, and verification processes related to supply chain risk management. Additionally, the document outlines expectations for conducting employee background checks and preventing tampering of Information and Communications Technology (ICT) inventory.
It emphasizes that responses must be credible, and the government may request documentation to confirm provided details. This systematic effort aligns with federal standards outlined in NIST SP 800-53, underlining the government's initiative to enhance cybersecurity resilience within supply chains and ensure that organizations have robust risk management practices in place.
The Secure Software Development Attestation Form, mandated by Executive Order 14028 and related OMB Memoranda, aims to ensure software used by federal agencies is developed securely. It outlines the obligations of software producers to attest to their compliance with established secure software development practices as outlined by NIST standards. The document specifies that software requires self-attestation if developed or significantly modified after September 14, 2022, or if it is continually updated. Exemptions apply to open-source software, federal agency-developed software, and components that are publicly available.
The self-attestation form collects details about the producer and software, requiring completion by an authorized signatory, typically the CEO. The producer can choose to substantiate compliance via a third-party assessment. If a completed attestation cannot be obtained, agencies may still use the software with a documented risk mitigation plan. Compliance with these protocols supports the federal objective of enhancing cybersecurity and securing the software supply chain effectively. The process encourages accountability and regular monitoring of security practices in software development.
The U.S. Department of State's Bureau of Diplomatic Technology has issued a Request for Information (RFI) to assess industry capabilities for providing an enterprise hybrid cloud computing platform. The goal is to find a market-leading solution that allows for monitoring and managing virtual resources like desktops and servers, ensuring compatibility with federal security standards while being scalable and user-friendly. The RFI solicits responses detailing company background, technical capability assessments relative to outlined functional requirements, and relevant federal project experience. Required qualifications include proven commercial-off-the-shelf (COTS) products, mandatory federal security certifications, and support for a diverse range of virtualization and cloud services. The document emphasizes a zero trust security approach and requires submissions by January 6, 2025, while stipulating that this RFI does not commit the government to procuring any products or services. This initiative aims to identify capable vendors who can meet the Department's complex IT needs effectively and securely.