Skip to content

feat: add NIST SP 800-161 Cybersecurity Supply Chain Risk Management skill#41

Open
sjackson0109 wants to merge 1 commit intoSushegaad:mainfrom
sjackson0109:feature/nist-sp-800-161-skill
Open

feat: add NIST SP 800-161 Cybersecurity Supply Chain Risk Management skill#41
sjackson0109 wants to merge 1 commit intoSushegaad:mainfrom
sjackson0109:feature/nist-sp-800-161-skill

Conversation

@sjackson0109
Copy link
Copy Markdown

NIST SP 800-161 Rev 1 — Cybersecurity Supply Chain Risk Management (C-SCRM)

Source Publication: NIST Special Publication 800-161 Revision 1, May 2022
CSRC URL: https://csrc.nist.gov/publications/detail/sp/800-161/rev-1/final

This pull request adds a complete Claude skill plugin for NIST SP 800-161 Rev 1, supporting CIOs, SAORMs, C-SCRM Programme Managers, ISSOs, Contracting Officers, and acquisition professionals implementing cybersecurity supply chain risk management programmes for federal information systems and organisations.


Files Added

plugins/nist-sp-800-161/
  .claude-plugin/plugin.json
  skills/nist-sp-800-161/
    SKILL.md
    references/
      sr-control-family.md
      supplier-assessment.md
      c-scrm-programme.md

Framework Coverage

C-SCRM Scope: Full ICT supply chain lifecycle from design through disposal. Addresses hardware, software, cloud services, SaaS, FOSS, COTS, managed services, and all sub-tier suppliers.

Supply Chain Threats: Six threat categories — counterfeit components, tampered products, inferior and fraudulent products, theft of sensitive information, installation of malicious code, poor manufacturing/development practices.

Multi-Tier Architecture: Three C-SCRM tiers aligned to SP 800-39 — Tier 1 (Enterprise: strategy, risk tolerance, governance), Tier 2 (Mission/Business: programme/project level), Tier 3 (Information System: SR control implementation). Supplier tier hierarchy: prime contractor, sub-tier supplier, component manufacturer.

SR Control Family: All 12 base controls (SR-1 through SR-12) plus all enhancements with baseline assignments (L/M/H) and detailed implementation guidance. Covers provenance, supplier assessments, acquisition strategies, tamper resistance, component authenticity, and disposal.

SBOM: NTIA minimum 7 data fields, SPDX and CycloneDX formats, delivery requirements, consumption procedure with NVD cross-reference, retention guidance. Aligned to EO 14028 software supply chain security requirements.

Supplier Risk Tiering: 7-factor scoring matrix (geography, ownership, prior incidents, certifications, sub-tier visibility, single-source dependency, component sensitivity) yielding Low/Moderate/High/Critical tier classification.

Supplier Assessments: Five assessment types matched to risk tier. Frequency guidance. Triggers for unscheduled reassessment.

Acquisition Lifecycle: C-SCRM requirements mapped to six acquisition phases (requirements definition through disposal). Pre-solicitation checklist, delivery/acceptance procedure, supply chain incident response.

Contract Clauses: Eight model clauses covering security requirements flow-down, incident/vulnerability notification (72 hours), significant change notification, EOL announcement, authenticity warranties, SBOM delivery, right-to-audit, and ownership change notification.


Reference Files

references/sr-control-family.md — Detailed implementation guidance for all SR controls (SR-1 through SR-12) and enhancements. Baseline assignments. Implementation notes addressing cloud, FOSS, and COTS scope. Hardware and software anti-counterfeiting techniques (SR-11). Tamper resistance technologies (SR-9). Provenance documentation fields (SR-4). Component disposal requirements (SR-12).

references/supplier-assessment.md — 7-factor supplier risk tiering worksheet with scoring interpretation. Abbreviated supplier assessment questionnaire (5 sections). 8 model C-SCRM contract clauses ready for legal review. SBOM minimum data fields (NTIA), recommended additional fields, format and delivery requirements. SBOM consumption procedure. Critical Component Identification Worksheet template.

references/c-scrm-programme.md — 7-step C-SCRM programme establishment procedure. Complete C-SCRM Plan template with all 12 required sections. Pre-solicitation C-SCRM checklist (10 items). Delivery and acceptance procedure for critical/high-risk components. 5-step supply chain incident response procedure (identify/assess, contain, notify, eradicate/recover, document). 7 programme-level C-SCRM metrics with measurements, targets, and reporting levels.


Integration Points

  • SP 800-53 Rev 5: SR control family is defined in SP 800-53 Rev 5; this skill provides SP 800-161 implementation guidance
  • SP 800-37 Rev 2 RMF: C-SCRM requirements integrated throughout the RMF lifecycle; SR controls appear in system security plans
  • SP 800-30 Rev 1: supply chain risk assessment methodology follows SP 800-30 risk determination approach
  • SP 800-218 SSDF: secure development requirements for software suppliers align to SSDF practices
  • EO 14028: SBOM requirements align to Executive Order 14028 Section 4 software supply chain security

Tests

python -m pytest tests/test_plugin_structure.py -v -k "nist-sp-800-161"

tests/test_plugin_structure.py::TestPluginDirectory::test_plugin_json_exists[nist-sp-800-161] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_plugin_json_is_valid[nist-sp-800-161] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_plugin_json_required_fields[nist-sp-800-161] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_plugin_version_semver[nist-sp-800-161] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_skills_directory_exists[nist-sp-800-161] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_skills_directory_has_one_skill_folder[nist-sp-800-161] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_skill_md_exists[nist-sp-800-161] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_skill_md_not_empty[nist-sp-800-161] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_no_files_outside_skill_folder[nist-sp-800-161] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_references_are_markdown[nist-sp-800-161] PASSED

10 passed, 95 deselected in 0.09s

…skill

PLUGIN: nist-sp-800-161
VERSION: 1.0.0
SOURCE: NIST Special Publication 800-161 Revision 1, May 2022
TITLE: Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations
CSRC: https://csrc.nist.gov/publications/detail/sp/800-161/rev-1/final

PLUGIN STRUCTURE:
  plugins/nist-sp-800-161/.claude-plugin/plugin.json
  plugins/nist-sp-800-161/skills/nist-sp-800-161/SKILL.md
  plugins/nist-sp-800-161/skills/nist-sp-800-161/references/sr-control-family.md
  plugins/nist-sp-800-161/skills/nist-sp-800-161/references/supplier-assessment.md
  plugins/nist-sp-800-161/skills/nist-sp-800-161/references/c-scrm-programme.md

FRAMEWORK COVERAGE:
  1. C-SCRM definition and scope: full ICT supply chain lifecycle from design through disposal
  2. ICT supply chain threats: counterfeit components, tampered products, inferior products, IP theft, malicious code insertion, insecure manufacturing
  3. Multi-tier C-SCRM model: Tier 1 (Enterprise), Tier 2 (Mission/Business), Tier 3 (Information System) with supplier tier hierarchy (prime, sub-tier, component manufacturer)
  4. C-SCRM programme components: policy, strategy, plan, and controls implementation
  5. Critical component identification: 7 sensitivity criteria, critical designation triggers, handling requirements throughout lifecycle
  6. SP 800-53 Rev 5 SR control family: all 12 base controls (SR-1 through SR-12) plus all enhancements with baseline assignments and implementation guidance
  7. SBOM requirements: NTIA minimum 7 data fields, SPDX and CycloneDX formats, delivery requirements, consumption process with NVD cross-referencing
  8. Supplier risk tiering: 7-factor scoring matrix yielding Low/Moderate/High/Critical tier classification
  9. Supplier assessments: five assessment types (documentation review, questionnaire, third-party, on-site audit, penetration testing), frequency guidance, unscheduled reassessment triggers
  10. Acquisition lifecycle integration: six-phase coverage from requirements definition through disposal with C-SCRM actions per phase
  11. C-SCRM contract clauses: 8 model clauses covering flow-down, incident notification, change notification, EOL, authenticity warranties, SBOM delivery, right-to-audit, ownership change
  12. Supplier assessment questionnaire: five sections covering security programme, secure development, sub-tier management, incident response, and physical security
  13. Provenance documentation: required fields for hardware and software components, SR-4 enhancements (identity, track/trace, validate genuine, pedigree)
  14. Component disposal: SR-12 requirements including SP 800-88 sanitisation alignment, anti-counterfeit disposal procedures, certificate of destruction
  15. Roles and responsibilities: CIO, SAORM, Chief Acquisition Officer, C-SCRM Programme Manager, ISO, ISSO, Contracting Officer, Legal Counsel
  16. C-SCRM metrics: 7 programme-level metrics with measurements and targets

REFERENCE FILES:
  sr-control-family.md:
    - All SR-1 through SR-12 controls with detailed implementation guidance
    - All SR control enhancements with descriptions and applicability
    - SR control baseline assignments (Low/Moderate/High)
    - Per-control implementation notes addressing scope gaps (cloud, FOSS, COTS)
    - Hardware and software anti-counterfeiting techniques per SR-11
    - Tamper resistance technologies per SR-9
  supplier-assessment.md:
    - 7-factor supplier risk tiering matrix with scoring guide
    - Abbreviated supplier assessment questionnaire (5 sections, all questions)
    - 8 model C-SCRM contract clauses with placeholder text ready for legal review
    - SBOM minimum data fields per NTIA and recommended additional fields
    - SBOM delivery requirements (format, timing, retention)
    - SBOM consumption procedure with NVD cross-reference step
    - Critical Component Identification Worksheet template
  c-scrm-programme.md:
    - 7-step C-SCRM programme establishment procedure
    - C-SCRM Plan template with all 12 required sections
    - Pre-solicitation C-SCRM checklist (10 items)
    - Delivery and acceptance procedure for critical/high components
    - Supply chain incident response procedure (5-step: identify/assess, contain, notify, eradicate/recover, document)
    - 7 C-SCRM programme metrics with measurements, targets, and reporting levels

INTEGRATION POINTS:
  - SP 800-53 Rev 5: SR control family is defined in this publication; 800-161 provides implementation guidance
  - SP 800-37 Rev 2 RMF: C-SCRM requirements are incorporated throughout the RMF lifecycle; SR controls appear in system security plans
  - SP 800-30 Rev 1: supply chain risk assessment follows SP 800-30 risk assessment methodology
  - SP 800-218 SSDF: secure development requirements for software suppliers align to SSDF practices
  - EO 14028 (May 2021): SBOM requirements align to EO 14028 Section 4 software supply chain security
  - FISMA: C-SCRM is a FISMA compliance requirement for federal agencies under OMB Circular A-130

TESTS:
  test_plugin_json_exists[nist-sp-800-161] PASSED
  test_plugin_json_is_valid[nist-sp-800-161] PASSED
  test_plugin_json_required_fields[nist-sp-800-161] PASSED
  test_plugin_version_semver[nist-sp-800-161] PASSED
  test_skills_directory_exists[nist-sp-800-161] PASSED
  test_skills_directory_has_one_skill_folder[nist-sp-800-161] PASSED
  test_skill_md_exists[nist-sp-800-161] PASSED
  test_skill_md_not_empty[nist-sp-800-161] PASSED
  test_no_files_outside_skill_folder[nist-sp-800-161] PASSED
  test_references_are_markdown[nist-sp-800-161] PASSED
  10 passed, 95 deselected
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant