⚠
BowTie Risk
Assessments
Hazards
Library
Implementations
Guide
← Back
Edit Barrier
Name
Type
Prevention
Mitigation
General
Category
Tags
(comma-separated)
Description
Define and implement processes and procedures to manage information security risks associated with the ICT supply chain, including hardware, software, and services. Verify the security practices of suppliers and monitor for changes in their risk profile.
Save changes
Cancel