<section title="12.7. Supply Chain"><subsection title="Objective"><paragraph
    title="12.7.1."


><![CDATA[<p>Technology supply chains are established and managed to ensure continuity of supply and protection of sensitive related information.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="12.7.2."


><![CDATA[<p>The NZISM provides additional guidance for managing supply chain security risks associated with the acquisition (lease or purchase) of ICT equipment or services for use in NZ Government systems.</p>]]></paragraph>
</block>
<block title="Supply chain"><paragraph
    title="12.7.3."


><![CDATA[<p><span>A supply chain is the movement of materials as they move from their source (raw materials) through manufacture to the end customer. A supply chain can include materials acquisition, purchasing, design, manufacturing, warehousing, transportation, customer service, and supply chain management. It requires people, information and resources to move a product from manufacturer to supplier to customer. Every supply chain carries some risk which may include product protection; counterfeit products and goods and defective products. ICT supply chains are invariably global and complex.</span></p>]]></paragraph>
<paragraph
    title="12.7.4."


><![CDATA[<p>Relationships with external service providers are established in a variety of ways, for example, through joint ventures, business partnerships, outsourcing arrangements (e.g. through supply contracts, interagency agreements, lines of business arrangements, service-level agreements), licensing agreements, and/or supply chain exchanges. The growing use of external service providers and new relationships being established with those providers present new and difficult challenges for organisations, especially in the area of information system security. These challenges include:</p><ul>
<li>Defining the types of external information system services provided to organisations;</li>
<li>Describing how those external services are protected; and</li>
<li>Obtaining the necessary assurances that the risks to organisational operations and assets, individuals, other organisations, and national security arising from the use of the external services are acceptable.</li>
</ul>]]></paragraph>
</block>
<block title="Supply chain risk"><paragraph
    title="12.7.5."


><![CDATA[<p><span>The degree of confidence that the risk from using external services is at an acceptable level depends on the assurance external organisations provide and trust that organisations place in external service providers. In some cases, the level of trust is based on the amount of direct control organisations are able to exert on external service providers in the use of security controls and assurance on the effectiveness of those controls.</span></p>]]></paragraph>
<paragraph
    title="12.7.6."


><![CDATA[<p><span>The level of control is usually established by the terms and conditions of the contracts or service-level agreements with the external service providers and can range from extensive control (e.g., negotiating contracts or agreements that specify detailed security requirements for the providers) to very limited control (e.g., using contracts or service-level agreements to obtain commodity services such as commercial telecommunications services).</span></p>]]></paragraph>
<paragraph
    title="12.7.7."


><![CDATA[<p>From an Information Assurance viewpoint, there are five key aspects to supply chain risk:</p><ol>
<li>Protection of sensitive information and systems;</li>
<li>Continuity of supply;&nbsp;</li>
<li>Product assurance;</li>
<li>Security validation; and</li>
<li>National Procurement Policy</li>
</ol>]]></paragraph>
</block>
<block title="Protection of sensitive information and systems"><paragraph
    title="12.7.8."


><![CDATA[<p>This relates to the security of the supply chain, products and information relating to the intended use, purchaser, location and type of equipment.</p>]]></paragraph>
</block>
<block title="Continuity of supply"><paragraph
    title="12.7.9."


><![CDATA[<p>This is the traditional set of risks associated with supply chain. As supply chains have globalised and components are sourced from a number of countries, a disruption to supply may have a global effect.</p>]]></paragraph>
</block>
<block title="Product assurance"><paragraph
    title="12.7.10."


><![CDATA[<p>This relates to assurance that the product, technology or device performs as designed and specified and includes the provenance of the product, equipment, or device.</p>]]></paragraph>
</block>
<block title="Security validation"><paragraph
    title="12.7.11."


><![CDATA[<p>Security validation checks the performance and security of the equipment. The security design elements and features of the equipment or product will need to be separately considered from any operational drivers.</p>]]></paragraph>
</block>
<block title="National procurement policy"><paragraph
    title="12.7.12."


><![CDATA[<p>All agencies are required to follow the guidance of the Government Rules of Procurement. Some exemptions are permitted under Rule 13 including that of security, “essential security interests: Measures necessary for the protection of essential security interests, procurement indispensable for national security or for national defence…”. Care must be taken to follow these rules wherever possible.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="12.7.13."


><![CDATA[<p>While NOT an exhaustive list, further information on procurement and supply chain can be found at:</p><table class="table-main" style="width: 100%;">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Government Use of Offshore Information and Communication Technologies (ICT) Service Providers - Advice on Risk Management April 2009</strong></p>
</td>
<td style="text-align: center;">State Services Commission</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.otago.ac.nz/its/otago609912.pdf" target="_blank">1135964_1 (otago.ac.nz)</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>The new Government Rules of Sourcing</strong></td>
<td style="text-align: center;">Procurement.govt.NZ</td>
<td style="width: 33%;">
<p><a href="https://www.procurement.govt.nz/procurement/principles-charter-and-rules/government-procurement-rules/">​​</a><a rel="noopener noreferrer" href="https://www.procurement.govt.nz/assets/procurement-property/documents/government-procurement-rules.pdf" target="_blank">Government Procurement Rules - Rules for sustainable and inclusive procurement</a><a href="https://www.procurement.govt.nz/procurement/principles-charter-and-rules/government-procurement-rules/"></a></p>
<p><a rel="noopener noreferrer" href="https://www.procurement.govt.nz/procurement/principles-charter-and-rules/government-procurement-rules/" target="_blank">Government Procurement Rules | New Zealand Government Procurement and Property</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Government Rules of Sourcing - Rules for planning your procurement, approaching the market and contracting</strong></p>
</td>
<td style="text-align: center;">Ministry of Business Innovation and Employment</td>
<td style="width: 33%;"><a href="https://www.procurement.govt.nz/"></a><a href="https://www.procurement.govt.nz/procurement/">Procurement | New Zealand Government Procurement and Property</a><a rel="noopener noreferrer" href="https://www.procurement.govt.nz/" target="_blank"></a></td>
</tr>
<tr>
<td>
<p><strong>SP&nbsp;<strong>800-161</strong></strong></p>
</td>
<td>
<p><strong>Special Publication, Supply Chain Risk Management</strong></p>
</td>
<td style="text-align: center;">Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST)</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="http://csrc.nist.gov/publications/drafts/800-161/sp800_161_draft.pdf" target="_blank">http://csrc.nist.gov/publications/drafts/800-161/sp800_161_draft.pdf [PDF, 3.1 MB]</a></td>
</tr>
<tr>
<td><strong>SP&nbsp;<strong>800-53 Revision 4</strong></strong></td>
<td><strong>Special Publication, Security and Privacy Controls for Federal Information Systems and Organizations</strong></td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf" target="_blank">http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf [PDF, 5.1 MB]</a></td>
</tr>
<tr>
<td><strong><strong>NISTIR 7622</strong></strong></td>
<td><strong>Notional Supply Chain Risk Practices for Federal Information Systems&nbsp;</strong></td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7622.pdf" target="_blank">http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7622.pdf [PDF, 2.9 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Commercial Procurement &amp; Relationships&nbsp;</strong></p>
</td>
<td style="text-align: center;">UK Cabinet Office</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.gov.uk/government/organisations/cabinet-office" target="_blank">https://www.gov.uk/government/organisations/cabinet-office</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>CIO Council Government ICT Offshoring (International Sourcing) Guidance</strong></td>
<td style="text-align: center;">UK Cabinet Office</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.gov.uk/government/publications/government-ict-offshoring-international-sourcing-guidance" target="_blank">https://www.gov.uk/government/publications/government-ict-offshoring-international-sourcing-guidance</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Commonwealth Procurement Rules</strong></td>
<td style="text-align: center;">Department of Finance and deregulation (Financial Management Group)</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.finance.gov.au/government/procurement/commonwealth-procurement-rules" target="_blank">Commonwealth Procurement Rules | Department of Finance</a> <a rel="noopener noreferrer" href="https://www.gov.uk/government/publications/government-ict-offshoring-international-sourcing-guidance" target="_blank"></a></p>
<p><a rel="noopener noreferrer" href="https://www.finance.gov.au/sites/default/files/2022-06/CPRs%20-%201%20July%202022.pdf" target="_blank">https://www.finance.gov.au/sites/default/files/2022-06/CPRs 1 July 2022.pdf</a>&nbsp;</p>
</td>
</tr>
<tr>
<td class="table-main"><strong><strong>ISO 31000:2018</strong></strong></td>
<td class="table-main"><strong>Risk management – Guidelines</strong></td>
<td style="text-align: center;">
<p>ISO</p>
<p>&nbsp;</p>
</td>
<td style="width: 33%;"><a title="Risk Management - Guidelines" rel="noopener noreferrer" href="https://www.iso.org/standard/65694.html" target="_blank">https://www.iso.org/standard/65694.html</a><br>
<p>&nbsp;</p>
</td>
</tr>
<tr>
<td class="table-main"><strong><strong>HB 231:2004</strong></strong></td>
<td class="table-main"><strong>Information Security Risk Management Guidelines</strong></td>
<td style="text-align: center;">
<p>Standards NZ</p>
</td>
<td style="width: 33%;"><a title="Information Security Risk Management Guidelines" rel="noopener noreferrer" href="https://standards.govt.nz/shop/hb-2312004/" target="_blank">https://standards.govt.nz/shop/hb-2312004/</a></td>
</tr>
<tr>
<td class="table-main"><strong><strong>ISO Guide 73:2009</strong></strong></td>
<td class="table-main"><strong>Risk management - Vocabulary</strong></td>
<td style="text-align: center;">ISO&nbsp;
<p>&nbsp;</p>
</td>
<td style="width: 33%;"><a title="Risk Management - Vocabulary" rel="noopener noreferrer" href="https://www.iso.org/standard/44651.html" target="_blank">https://www.iso.org/standard/44651.html</a><br>
<p>&nbsp;</p>
</td>
</tr>
<tr>
<td class="table-main"><strong><strong>ISO/IEC 31010:2009</strong></strong></td>
<td class="table-main"><strong>Risk management - Risk assessment techniques</strong></td>
<td style="text-align: center;">ISO
<p>&nbsp;</p>
</td>
<td style="width: 33%;">
<p><a title="Risk Management - Risk Assessment techniques" rel="noopener noreferrer" href="https://www.iso.org/standard/51073.html" target="_blank">https://www.iso.org/standard/51073.html</a></p>
</td>
</tr>
<tr>
<td class="table-main"><strong><strong>ISO/IEC 27002:2022</strong></strong></td>
<td class="table-main">
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Information security controls</strong></p>
</td>
<td style="text-align: center;">ISO/IEC
<p>&nbsp;</p>
</td>
<td style="width: 33%;">
<p><a title="ISO/IEC 27002:2022" rel="noopener noreferrer" href="https://www.iso.org/standard/75652.html" target="_blank">https://www.iso.org/standard/75652.html</a></p>
<p><a href="http://www.standards.co.nz"><br></a><a href="http://www.iso.org"></a></p>
</td>
</tr>
<tr>
<td class="table-main"><strong><strong>ISO/IEC 27005:2012</strong></strong></td>
<td class="table-main"><strong>Information technology - Security Techniques - Information Security Risk Management</strong></td>
<td style="text-align: center;">
<p class="product__standard-number">AS/NZS</p>
<p class="product__standard-number">ISO/IEC</p>
</td>
<td style="width: 33%;">
<p><a title="Information Technology - Security Techniques - Information Security Risk Management" rel="noopener noreferrer" href="https://standards.govt.nz/shop/asnzs-isoiec-270052012/" target="_blank">https://standards.govt.nz/shop/asnzs-isoiec-270052012/</a></p>
<p><a href="http://www.standards.co.nz"><br></a><a href="http://www.iso27001security.com/html/27002.html"></a></p>
</td>
</tr>
<tr>
<td class="table-main"><strong><strong>ISO 28000:2007&nbsp;</strong></strong></td>
<td class="table-main"><strong>Specification for security management systems for the supply chain</strong></td>
<td style="text-align: center;">ISO
<p>&nbsp;</p>
</td>
<td style="width: 33%;">
<p><a title="Specification for security management systems for the supply chain" rel="noopener noreferrer" href="https://www.iso.org/standard/44641.html" target="_blank">https://www.iso.org/standard/44641.html</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Risk Management"><paragraph
    title="12.7.14.R.01."

    tags="Technical,Product Security,Risk Management,Supply Chain"


><![CDATA[<p>ICT supply chains can introduce particular risks to an agency. In order to manage these risks, in addition to other identified ICT risks, supply chain risks are incorporated into an agency’s assessment of risk and the Security Risk Management Plan (SRMP). Identified risks are managed through the procurement process and through technical checks and controls (See <a title="SRMPs" href="http://nzism.gcsb.govt.nz/ism-document#Section-12761">Section 5.3 – Security Risk Management Plans</a> and <a title="System certification and accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 – System Certification and Accreditation</a>).</p>]]></paragraph>
<paragraph
    title="12.7.14.C.01."

    tags="Technical,Product Security,Risk Management,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3634"
><![CDATA[<p>Agencies SHOULD incorporate the consideration of supply chain risks into an organisation-wide risk assessment and management process.</p>]]></paragraph>
<paragraph
    title="12.7.14.C.02."

    tags="Technical,Product Security,Risk Management,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3638"
><![CDATA[<p>Agencies SHOULD monitor supply chain risks on an ongoing basis and adjust mitigations and controls appropriately.</p>]]></paragraph>
<paragraph
    title="12.7.14.C.03."

    tags="Technical,Product Security,Risk Management,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3639"
><![CDATA[<p>Agencies SHOULD follow the Government Rules of Procurement.</p>]]></paragraph>
</block>
<block title="Contractor or Supplier Capability"><paragraph
    title="12.7.15.R.01."

    tags="Technical,Product Security,Supply Chain"


><![CDATA[<p>Agencies can assess the capability of a contractor and any subcontractors to meet their security of information, supply and product requirements.</p>]]></paragraph>
<paragraph
    title="12.7.15.C.01."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3644"
><![CDATA[<p>Agencies SHOULD require tenderers and contractors to provide information:</p><ul>
<li>identifying any restrictions on the disclosure, transfer or use of technology arising out of export controls or security arrangements; and</li>
<li>demonstrating that their supply chains comply with the security of supply requirements set out in the contract documents.</li>
</ul>]]></paragraph>
<paragraph
    title="12.7.15.C.02."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3646"
><![CDATA[<p>Agencies SHOULD request information from contractors and subcontractors to assess their ability to protect information.</p>]]></paragraph>
</block>
<block title="Security of Information"><paragraph
    title="12.7.16.R.01."

    tags="Technical,Product Security,Supply Chain"


><![CDATA[<p>After conducting a risk assessment, agencies and suppliers have the means and capability to protect classified information throughout the tendering and contracting process.</p>]]></paragraph>
<paragraph
    title="12.7.16.C.01."

    tags="Technical,Product Security,Supply Chain"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="3651"
><![CDATA[<p>Agencies MUST include contractual obligations on all contractors and subcontractors to safeguard information throughout the tendering and contracting procedure.</p>]]></paragraph>
<paragraph
    title="12.7.16.C.02."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3653"
><![CDATA[<p>Agencies SHOULD include contractual obligations to safeguard information throughout the tendering and contracting procedure.</p>]]></paragraph>
<paragraph
    title="12.7.16.C.03."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3654"
><![CDATA[<p>Agencies SHOULD reject contractors and subcontractors where they do not possess the necessary reliability to exclude risks to national security; or have breached obligations relating to security of information during a previous contract in circumstances amounting to grave misconduct.</p>]]></paragraph>
</block>
<block title="Continuity of Supply"><paragraph
    title="12.7.17.R.01."

    tags="Technical,Product Security,Supply Chain"


><![CDATA[<p>You can also require suppliers to provide commitments on the continuity of supply. These can include commitments from the supplier to ensure:</p><ul>
<li>delivery time;</li>
<li>stock levels;</li>
<li>visibility of the supply chain; and</li>
<li>supply chain resilience.</li>
</ul>]]></paragraph>
<paragraph
    title="12.7.17.C.01."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3658"
><![CDATA[<p>Agencies SHOULD ensure that changes in their supply chain during the performance of the contract will not adversely affect the continuity of supply requirements.</p>]]></paragraph>
</block>
<block title="Product Assurance"><paragraph
    title="12.7.18.R.01."

    tags="Technical,Product Security,Supply Chain,Assurance"


><![CDATA[<p>In addition to the product selection and acquisition guidance in this section, agencies are able to identify and mitigate risks through supply chain visibility, provenance, security validation and pre-installation tests and checks.</p>]]></paragraph>
<paragraph
    title="12.7.18.R.02."

    tags="Technical,Product Security,Supply Chain,Assurance"


><![CDATA[<p>Agencies, with the cooperation of their suppliers, should establish the provenance of any products and equipment. Provenance is defined as a record of the origin, history, specification changes and supply path of the products or equipment.</p>]]></paragraph>
<paragraph
    title="12.7.18.C.01."

    tags="Technical,Product Security,Supply Chain,Assurance"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3669"
><![CDATA[<p>Agencies MUST require suppliers and contractors to provide the provenance of any products or equipment.</p>]]></paragraph>
<paragraph
    title="12.7.18.C.02."

    tags="Technical,Product Security,Supply Chain,Assurance"


    classification="All Classifications"
    compliance="Should"
    cid="3674"
><![CDATA[<p>Agencies SHOULD require suppliers and contractors to provide the provenance of any products or equipment.</p>]]></paragraph>
</block>
<block title="Security validation"><paragraph
    title="12.7.19.R.01."

    tags="Technical,Product Security,Supply Chain"


><![CDATA[<p>Validation of the performance and security of the equipment is a vital part of the ongoing integrity and security of agency systems. The security design elements and features of the equipment or product will need to be separately considered from any operational drivers. Where compromises in security performance, capability or functionality are apparent, additional risk mitigation, controls and countermeasures may be necessary.</p>]]></paragraph>
<paragraph
    title="12.7.19.C.01."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3691"
><![CDATA[<p>Agencies SHOULD validate the security of the equipment against security performance, capability and functionality requirements.</p>]]></paragraph>
<paragraph
    title="12.7.19.C.02."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3693"
><![CDATA[<p>Where deficiencies in security performance, capability and functionality are identified, agencies SHOULD implement additional risk mitigation measures.</p>]]></paragraph>
</block>
<block title="Pre-Installation Tests and Checks "><paragraph
    title="12.7.20.R.01."

    tags="Technical,Product Security,Supply Chain"


><![CDATA[<p>An essential part of quality and security assurance is the delivery inspection, pre-installation and functional testing of any equipment. In particular, large systems that integrate equipment from different suppliers or that have specialised configuration and operational characteristics may require additional testing to provide assurance that large scale disruptions and security compromises are avoided.</p>]]></paragraph>
<paragraph
    title="12.7.20.C.01."

    tags="Technical,Product Security,Supply Chain"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="3698"
><![CDATA[<p>Agencies MUST consult with the GCSB on pre-installation, security verification and related tests before the equipment is used in an operational system.</p>]]></paragraph>
<paragraph
    title="12.7.20.C.02."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3700"
><![CDATA[<p>Agencies SHOULD inspect equipment on receipt for any obvious signs of tampering, relabelling or damage.</p>]]></paragraph>
<paragraph
    title="12.7.20.C.03."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3701"
><![CDATA[<p>Agencies SHOULD inspect equipment on receipt and test the operation before installation.</p>]]></paragraph>
<paragraph
    title="12.7.20.C.04."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3703"
><![CDATA[<p>Agencies SHOULD conduct installation verification and related tests before the equipment is used in an operational system.</p>]]></paragraph>
<paragraph
    title="12.7.20.C.05."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3704"
><![CDATA[<p>Where any software, firmware or other forms of programme code are required for the initialisation, operation, servicing or maintenance of the equipment, malware checks SHOULD be conducted before the equipment is installed in an operational system.</p>]]></paragraph>
</block>
<block title="Equipment Servicing"><paragraph
    title="12.7.21.R.01."

    tags="Technical,Product Security,Supply Chain"


><![CDATA[<p>Some larger or complex systems can have dependencies on particular infrastructures, equipment, software or configurations. Although these types of systems can be less flexible in responding to the rapid changes in technologies, the risks are outweighed by the functionality of the system. In such cases, the continuing support and maintenance of essential components is vital.</p>]]></paragraph>
<paragraph
    title="12.7.21.C.01."

    tags="Technical,Product Security,Supply Chain"


    classification="All Classifications"
    compliance="Should"
    cid="3709"
><![CDATA[<p>For equipment that is expected to have an extended operational life in a critical system, and in the event that the supplier is no longer able to supply these, agencies SHOULD provide for the acquisition of:</p><ul>
<li>necessary licences;</li>
<li>information to produce spare parts, components, assemblies;</li>
<li>testing equipment; and</li>
<li>technical assistance agreements.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
