This document is under active development and has not been finalized.
Skip to content

Supply Chain Security

LEGAL BASIS

§30(2) No. 4 BSIG – Supply chain security including security-related aspects of the relationships between entities and their direct suppliers or service providers

Vendor Overview

CategoryExamplesRisk Assessment
InfrastructureHetzner, Netcup (hosting, servers)High – availability
Cloud servicesObject storage, DNSHigh – confidentiality
Software suppliersThird-party libraries, SaaSMedium – supply chain risk
Support partnersMaintenance, consultingLow – limited access

Assessment Criteria

CriterionDescription
Security certificationsISO 27001, SOC 2, BSI C5 or equivalent
Location / jurisdictionEU jurisdiction preferred, third-country transfers only with guarantees
Incident response capabilityDocumented process, reporting timelines compatible with §32 BSIG
Contract designSecurity requirements, audit rights, termination clauses
SubcontractorsTransparency regarding further subcontractors

Contractual Security Requirements

Contracts with service providers include:

  • Minimum information security requirements
  • Obligation to immediately report security incidents
  • Audit and inspection rights
  • Data retention and deletion provisions
  • Exit strategy and data repatriation

Review Cycle

ActivityInterval
Re-assessment of critical providersAnnually
Contract reviewOn renewal / change
Event-driven reviewOn security incident or material change

CRA Synergy

Software supply chain management (SBOM, signing, dependency policy) is described in the CRA Supply Chain Documentation. NIS2 supplements this with IT service provider and infrastructure vendor assessment.

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT