2nd ICAI 2022

International Conference on Automotive Industry 2022

Mladá Boleslav, Czech Republic

4.4 Business partners exempt from security declaration requirement

1

DO 4.5 Security reviews of business partners

4

1

1

5 SUPPLY CHAIN SECURITY PROCESS

PLAN 5.1 General

6

1

PLAN 5.2 Identification of the scope of the security assessment PLAN 5.3 Conduction of the security assessment PLAN 5.3.1 Assessment personnel

5

1

9

2

PLAN 5.3.2 Assessment process

15

3÷4

DO 5.4 Development of the supply chain security plan DO 5.5 Execution of the supply chain security plan

5

1

5.6 Documentation and monitoring of the supply chain security process

CHECK 5.6.1 General

4 1

1

ACT 5.6.2 Continual improvement

CHECK 5.7 Actions required after a security incident DO 5.8 Protection of the security information

5÷7

3

1

ANNEX A Supply chain security process A.1 General A.2 Identification of the scope of the security assessment A.3 Conduction of the security assessment A.3.1 General A.3.2 Performance review list A.3.3 Performance review A.3.4 Security threat scenarios A.4 Development of the security plan A.4.1 General A.4.2 Documentation A.4.3 Communication A.5 Execution of the security plan A.6 Documentation and monitoring of the security process A.7 Continual improvement ANNEX B Methodology for security risk assessment and development of countermeasures B.1 General

164

Made with FlippingBook Ebook Creator