SKIP TO PAGE CONTENT

SR-5 Acquisition Strategies, Tools, and Methods

Last Review: 10/1/22

Statement

WTAMU can use the acquisition process to protect the supply chain this could include techniques such as obscuring the end use of a system or system component, using blind or filtered buys, requiring tamper evident packaging, or using trusted or controlled distribution. These may provide protections against unauthorized production, theft, tampering, insertion of counterfeits, insertion of malicious software or backdoors, and poor development practices throughout the system development life cycle.

Applicability

This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, or designee responsible for implementation.

Implementation

WTAMU shall employ acquisition strategies, contract tools, and procurement methods to protect against, identify, and mitigate supply chain risks.

Phone
Twitter
Facebook
Instagram
Mail