Mitigating ICT Supply Chain Risks with Qualified Bidder and Manufacturer Lists Fact Sheet

Mitigating ICT Supply Chain Risks with Qualified Bidder and Manufacturer Lists Fact Sheet
Overview
The world is becoming more dependent on, and more connected by, information and communications technology (ICT) products and services. At the same time, the global ICT supply chain continues to increase in sophistication and complexity. Hundreds of entities in multiple countries may contribute to a single product, including mining rare earth metals, developing integrated circuits or software, performing the final assembly of the product, or storing and delivering finished goods or repaired parts. Each of these entities and their associated supply chain partners can contribute to overall supply chain risk.
The Cybersecurity and Infrastructure Security Agency (CISA) ICT Supply Chain Risk Management (SCRM) Task Force’s report, Mitigating ICT Supply Chain Risks with Qualified Bidder (QBL) and Manufacturer Lists (QML), provides realistic, actionable, economically feasible, and risk-based recommendations surrounding the use of “Qualified Lists” as one tool among many, that can help organizations better manage ICT supply chain risk.
Actionable Guidance for Public and Private Organizations
This report explains the purpose and benefits of Qualified Lists, provides a description of factors that inform a decision to build/rely on a QBL/QML for ICT products and services, and proposes actionable recommendations for incorporating SCRM considerations into new and existing ICT-related qualified list criteria and program processes. These recommendations are intended to be relevant and informative for both public and private sector purchasers and providers of ICT products and services.
As defined by the Federal Acquisition Regulation, and for the purpose of the report, a QBL is a list of bidders who have had their products examined and tested and who have satisfied all applicable qualification requirements for that product or have otherwise satisfied all applicable requirements. A QML is a list of manufacturers who have had their products examined and tested and who have satisfied all applicable qualification requirements for that product.
Establishing and utilizing vetted, qualified sources of supplies can reduce an organization’s exposure to security, integrity, resilience, or quality risks. Incorporating cyber supply chain risk management qualification criteria into existing or new qualification list processes can provide a targeted and effective means for providing assurance that an ICT supplier and their product or service is sufficiently trustworthy. Table 1 provides a summary of the benefits, costs, and risks associated with QLs.
Table 1: Summary of Benefits, Costs, and Risk Associated with Qualified Lists (QL)
Benefits | Costs and Risks |
---|---|
|
|
While there are many examples of Approved Products Lists and QLs throughout government and industry today, there are opportunities to reduce substantial risk to the ICT consumer by developing and implementing evaluation criteria that focuses on the supply chain risks associated with the manufacturer of the product and the entity that sells or provides the product or service.
This report can be used by organizations to identify circumstances under which the use of a QBL or a QML when purchasing ICT products or services may be appropriate. In addition, it explains how to mitigate ICT supply chain risks. It also provides supply chain risk management criteria and considerations to be used in the qualification process. Listed below is a use case example that describes SCRM resilience criteria that could be incorporated into a QBL/QML.
Use Case: The information technology components and parts produced by these manufacturers will be used in implanted medical devices. A failure or mal-performance has the potential to cause death.
Criteria | Evidence | Verification / Validation | Reference Standard / Guidance |
---|---|---|---|
Designed-in fail-safe functionality | Device | Device Testing by Independent Third-Party | Technical Documentation |
Designed-in redundant functionality | Device | Device Testing by Independent Third-Party | Technical Documentation |
Acceptable results of a stress test | Device | Device Testing by Independent Third-Party | Technical Documentation |
Resources
- ICT Supply Chain Risk Management Task Force: https://www.cisa.gov/resources-tools/groups/ict-supply-chain-risk-management-task-force
- ICT Supply Chain Library: CISA.gov/ict-supply-chain-library