G.3.1 Security-related contract terms
Control Details
Objective
Component, system, AI model, and service acquisition policies include the inclusion of adherence to security policies, security requirements, and secure SDLC practices that are compatible with compliance requirements.
Definition
Compliance requirements, security requirements, and secure SDLC practices are included in vendor contracts with specified means of adherence enforcement. Examples include supplying an SBOM, VEX, self-attestation of security practices and provenance information; having a vulnerability disclosure program and incident response plan; and a security training program. The vendors include component, cloud, AI model, middleware providers, container and orchestration providers, and contractors.
Assessment Questions
- What requirements language is included in system and services acquisition policies and contracts related to adherence to security policies, security requirements, and secure SDLC practices compatible with compliance requirements?
- How Do you obtain SBOMs, provenance data, and attestation of adhering to security practices from your suppliers?
- How is adherence to contract terms verified?
- How do you track the provenance of training, testing, fine-tuning, and aligning data used for AI models?