2nd ICAI 2022
International Conference on Automotive Industry 2022
Mladá Boleslav, Czech Republic
4.4 Business partners exempt from security declaration requirement
1
DO 4.5 Security reviews of business partners
4
1
1
5 SUPPLY CHAIN SECURITY PROCESS
PLAN 5.1 General
6
1
PLAN 5.2 Identification of the scope of the security assessment PLAN 5.3 Conduction of the security assessment PLAN 5.3.1 Assessment personnel
5
1
9
2
PLAN 5.3.2 Assessment process
15
3÷4
DO 5.4 Development of the supply chain security plan DO 5.5 Execution of the supply chain security plan
5
1
5.6 Documentation and monitoring of the supply chain security process
CHECK 5.6.1 General
4 1
1
ACT 5.6.2 Continual improvement
CHECK 5.7 Actions required after a security incident DO 5.8 Protection of the security information
5÷7
3
1
ANNEX A Supply chain security process A.1 General A.2 Identification of the scope of the security assessment A.3 Conduction of the security assessment A.3.1 General A.3.2 Performance review list A.3.3 Performance review A.3.4 Security threat scenarios A.4 Development of the security plan A.4.1 General A.4.2 Documentation A.4.3 Communication A.5 Execution of the security plan A.6 Documentation and monitoring of the security process A.7 Continual improvement ANNEX B Methodology for security risk assessment and development of countermeasures B.1 General
164
Made with FlippingBook Ebook Creator