SR-5 Acquisition Strategies, Tools, and Methods
Statement
WTAMU can use the acquisition process to protect the supply chain this could include techniques such as obscuring the end use of a system or system component, using blind or filtered buys, requiring tamper evident packaging, or using trusted or controlled distribution. These may provide protections against unauthorized production, theft, tampering, insertion of counterfeits, insertion of malicious software or backdoors, and poor development practices throughout the system development life cycle.
Applicability
This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, or designee responsible for implementation.
Implementation
WTAMU shall employ acquisition strategies, contract tools, and procurement methods to protect against, identify, and mitigate supply chain risks.