ML23306A216
| ML23306A216 | |
| Person / Time | |
|---|---|
| Issue date: | 11/07/2023 |
| From: | Kathy Lyons-Burke NRC/OCIO |
| To: | |
| References | |
| CSO-TEMP-0016 | |
| Download: ML23306A216 (1) | |
Text
Nuclear Regulatory Commission Office of the Chief Information Officer Computer Security Template Office Instruction:
CSO-TEMP-0016 Office Instruction
Title:
NRC Licensee Related Supply Chain Risk Assessment Template Revision Number:
1.0 Effective Date:
November 7, 2023 Primary Contacts:
Kathy Lyons-Burke Senior Level Advisor for Information Security Responsible Organization:
OCIO/CSO Summary of Changes:
CSO-TEMP-0016, NRC Licensee Related Supply Chain Risk Assessment Template, defines the template that must be used to record the supply chain risk assessment of an NRC licensee related company.
ADAMS Accession No.:
ML23306A216 Agency Official Approval Signature and Date Jon Feibus Chief Information Security Officer (CISO)
Office of the Chief Information Officer (OCIO)
Jonathan R. Feibus Digitally signed by Jonathan R.
Feibus Date: 2023.11.02 16:24:37 -04'00'
CSO-TEMP-0016, NRC Licensee Related Supply Chain Risk Assessment Template i
TABLE OF CONTENTS 1
Purpose............................................................................................................................. 1 2
Template Instructions....................................................................................................... 1 2.1 Template-Wide Instructions......................................................................................... 1 2.2 Headers and Footers................................................................................................... 3 2.3 Title Page.................................................................................................................... 3 2.4 Executive Summary..................................................................................................... 3 2.5 Table of Contents, Figures, and Tables Pages............................................................ 4 2.6 Company Description................................................................................................... 4 2.7 Risk Assessment Information Sources......................................................................... 4 2.8 SCRA Information Sources.......................................................................................... 5 2.9 Risks Identified............................................................................................................ 5 2.9.1 Overall Risk.......................................................................................................... 5 2.9.2 Financial Risk....................................................................................................... 5 2.9.3 FOCI Risk............................................................................................................. 6 2.9.4 Operational Risk................................................................................................... 6 2.9.5 Reputational, Criminal, and Regulatory Risk......................................................... 6 2.10 Illumination Information................................................................................................ 7 2.11 Risk Determination....................................................................................................... 8 2.12 Appendix A Acronyms.................................................................................................. 8 2.13 Appendix B References............................................................................................... 8 2.14 Document Revision History Page................................................................................. 8
Computer Security Template CSO-TEMP-0016 NRC Licensee Related Supply Chain Risk Assessment Template 1 PURPOSE CSO-TEMP-0016 defines the template that must be used to record the supply chain risk assessment for an NRC licensee related company. CSO-PROS-0016, NRC Licensee Related Supply Chain Risk Assessment Process is used to perform the assessment and the results are recorded within this template.
2 TEMPLATE INSTRUCTIONS The template sections are completed by the supply chain risk management working group chair.
Placeholders in <blue> in the template should be replaced with the required information and the font color returned to black before submitting the assessment.
In some cases, the boilerplate has multiple text options. These options are provided in {green}
and separated by ;. After the appropriate text is chosen, the assessor must change the font color to black and remove the brackets.
2.1 Template-Wide Instructions REMOVE document instructions before filling out the template.
General placeholders are provided throughout the Supply Chain Risk Assessment (SCRA) template and should be replaced with the required information for all occurrences. A spreadsheet that contains all of the high-risk findings must be part of the ADAMS SCRA package with the documented risk assessment.
For each section in the SCRA template, replace each general placeholder with the following information:
<ADAMS asscession #> Provide the Agencywide Documents Access and Management System (ADAMS) accession number of the relevant document.
<Brief description of rationale for overall risk level determination> Provide the rationale for the assessor determined level of supply chain risk for the company.
<Brief description of why> Provide the rationale for the assessor determined level of supply chain risk.
<Company Name> Provide the exact name of the licensee related company.
SUMMARY
This Supply Chain Risk Assessment (SCRA) was performed to identify supply chain risks associated with an NRC licensee. SCRAs are conducted by a supply chain risk assessor utilizing a data analytics solution to assess possible supply chain risks.
This report outlines the risks associated with <Company Name>, and Table ES-1 provides the impact level summary.
Table ES-1: <Company Name> SCRA Summary Risk Area Risks Identified Risks of Concern Risk Severity Risk Level
[Deep Dive Adjusted Risk Levels]
Financial Risk
<n>
<n>
<n.nn>
<level>
<adj-level>
Foreign Ownership, Control, and Influence (FOCI) Risk
<n>
<n>
<n.nn>
<level>
<adj-level>
Operational Risk
<n>
<n>
<n.nn>
<level>
<adj-level>
Reputational, Criminal, and Regulatory (RCR) Risk
<n>
<n>
<n.nn>
<level>
<adj-level>
Overall Risk
<n>
<n>
<n.nn>
<level>
<adj-level>
Financial Risk: The overall risk of the identified financial risks of concern is <risk level>. <Brief description of why>.
FOCI Risk: The overall risk of the identified FOCI risks of concern is <risk level>. <Brief description of why>.
Operational Risk: The overall risk of the identified operational risks of concern is <risk level>.
<Brief description of why>.
Reputational, Criminal, and Regulatory Risk: The overall risk of the identified reputational, criminal, and regulatory risks of concern is <risk level>. <Brief description of why>.
{No Deep Dive was performed. l Deep Dive Identified Risk:
NRC tasked Exiger Government Solutions (EGS) with performing a deep dive on <Company Name>.
The deep dive surfaced the following key findings:
<Key finding 1>
<Key finding 2>
<Key finding 3>}
{No illumination was performed. l Illumination Identified Risk:
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
ii NRC tasked Exiger Government Solutions (EGS) with illuminating <Brief description of requested illumination>.
The illumination surfaced the following key findings:
<Key finding 1>
<Key finding 2>
<Key finding 3>}
Overall Risk: The overall risk of the identified risks of concern is <SCRA Risk>. <Brief description of rationale for overall risk level determination>.
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
iii Table of Contents 1
Introduction....................................................................................................................... 1 1.1 Purpose....................................................................................................................... 1 1.2
<Company Name> Description.................................................................................... 1 1.3 Risk Assessment Information Sources......................................................................... 1 1.4 SCRA Information Sources.......................................................................................... 2 2
Risks Identified................................................................................................................. 2 2.1 Overall Risk................................................................................................................. 2 2.2 Financial Risk.............................................................................................................. 3 2.2.1 Assessor Financial Risk Summary........................................................................ 5 2.3 Foreign Ownership, Control, and Influence (FOCI) Risk.............................................. 5 2.3.1 Assessor FOCI Risk Summary............................................................................. 6 2.4 Operational Risk.......................................................................................................... 7 2.4.1 Assessor Operational Risk Summary.................................................................... 8 2.5 Reputational, Criminal, and Regulatory Risk................................................................ 9 2.5.1 Assessor Reputational, Criminal, and Regulatory Risk Summary........................11 3
<Company Name> Deep Dive..........................................................................................11 3.1
<Deep Dive Title>.......................................................................................................11 3.2
<Deep Dive Title>.......................................................................................................12 3.3
<Deep Dive Title>.......................................................................................................12 3.4 Deep Dive Summary...................................................................................................12 4
Illumination Information..................................................................................................12 4.1
<Illumination Title>......................................................................................................12 4.2
<Illumination Title>......................................................................................................13 4.3
<Illumination Title>......................................................................................................13 4.4 Illumination Summary.................................................................................................13 5
Risk Determination..........................................................................................................13 Appendix A Acronyms........................................................................................................15 Appendix B References......................................................................................................17 Appendix D Glossary..........................................................................................................20
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
iv Table of Tables Table 1: Financial Identified High Risks..................................................................................... 4 Table 2: FOCI Identified High Risks.......................................................................................... 6 Table 3: Operational Identified High Risks................................................................................ 7 Table 4: Reputational, Criminal, and Regulatory Risk Identified High Risks.............................. 9 Table of Figures Figure 1: Exiger Risk Scoring Values........................................................................................ 2 Figure 2: <Company Name> Overall Risk................................................................................. 3 Figure 3: <Company Name> Summary of Unstructured Risk Events........................................ 3 Figure 4: <Company Name> Average Financial Risk................................................................ 3 Figure 5: Credit Risk Scale........................................................................................................ 4 Figure 6: <Company Name> Average FOCI Risk...................................................................... 5 Figure 7: <Company Name> Average Operational Risk............................................................ 7 Figure 8: <Company Name> Average Reputational, Criminal, and Regulatory Risk................. 9
1 INTRODUCTION The Federal Acquisition Supply Chain Security Act of 2018 (H.R. 7327, 41 USC Chap. 13 Subchap. III and Chap. 47, P.L. 115-390) (Dec. 21, 2018) requires all agencies to assess, avoid, mitigate, accept, or transfer supply chain risks; and Executive Order 14028 requires Federal agencies to enhance software supply chain security.
Supply chain risk profiles must be continually assessed for evolving threats, and prioritization of resources should flow to those areas where the impact would be unacceptably great.
While the risk of compromise is inherent in any technology that collects sensitive data or otherwise has access to critical systems, the risk increases considerably when the technology is produced or supplied by a company that could be persuaded or readily coerced to access that data or abuse that access on behalf of a foreign adversary.
1.1 Purpose This Supply Chain Risk Assessment (SCRA) was performed to identify supply chain risks associated with an NRC licensee related company. SCRAs are conducted by a supply chain risk assessor utilizing a data analytics solution to assess possible supply chain risks.
1.2 <Company Name> Description
<Company Name> <Licensee Related Function/Purpose>
<Licensee Relationship to NRC>
<Company Name> headquarters {are l is} located in <assessment of company headquarters locations>.
1.3 Risk Assessment Information Sources The Dun & Bradstreet (D&B) DUNS Number is a unique nine-digit identifier for businesses.
This number is assigned once D&B identifies a company as being unique from any other in the D&B Data Cloud. The DUNS Number is used as the starting point for any company's Live Business Identity; the most comprehensive and continually updated view of any company in the Data Cloud.
The <Company Name> DUNS Number is: <DUNS #>.
A CAGE Code is assigned by the Department of Defense (DOD) Defense Logistics Agency (DLA) and represents a company's physical address for GSA mailings, payments, and administrative records. Government agencies may also use CAGE Codes to verify a security clearance or for a pre-award survey. A company needs a CAGE Code to sell to the government.
The <Company Name> CAGE Code is: <CAGE Code>.
A Unique Entity Identifier (UEI) is a number issued by the System for Award Management (SAM) to identify businesses and other entities that do business with the federal government.
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
2 The <Company Name> UEI number is: <UEI #>
1.4 SCRA Information Sources Following are the information sources used to develop this SCRA for <Company Name>:
<Document Title>, <Unique Identifier>, <Document Date>, <(URL Access Link)>
<Document Title>, <Unique Identifier>, <Document Date>, <(URL Access Link)>
2 RISKS IDENTIFIED A risk analysis has been developed for the <Company Name> supply chain risk assessment and is attached to this report. The following items, available in the DDIQ dashboard, were included in the risk analysis:
[Unstructured Risk Events]
[Structured Risk Events]
[Watchlist Detail Structure]
[Foreign Risk Breakdown]
[Ownership Target Values]
[Section 889 Mentions]
[Industry Breakdown]
[Federal Government Notices]
The Exiger risk scoring is performed in accordance with Figure 1: Exiger Risk Scoring Values.
2.1 Overall Risk The overall risk associated with <Company Name> is <risk level>.
Figure 2 represents the overall risk associated with <Company Name>, and Figure 3 provides a pie chart breakout of the unstructured risk events. The overall risk is determined using the weighted values of the FOCI (40%), the average financial risk (10%), the average operational risk (25%), and the average reputational risk (25%).
8 - 10 HIGH 5.5 - 7.99 MEDIUM-HIGH 4 - 5.49 MEDIUM 2.5 - 3.99 LOW-MEDIUM 0 - 2.49 LOW Figure 1: Exiger Risk Scoring Values
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
3 Figure 2: <Company Name> Overall Risk The Overall Risk associated with <Company Name> is <risk level>.
Figure 3: <Company Name> Summary of Unstructured Risk Events 2.2 Financial Risk Financial management can either build or erode an organizations ability to deliver as a service provider. Figure 4 shows the average financial risk for <Company Name>.
Figure 4: <Company Name> Average Financial Risk The average <Company Name> financial risk level is <risk level>.
D&B evaluates the sustainability and payment behavior of a company by assessing the risk of failure and the risk of slow-to-severely-delinquent payments through scores, ratings, and indices.
Viability rankings range from 1-9, where 9 represents the highest risk of going out of business or becoming inactive and 1 represents the lowest risk. For the purposes of this report, green is considered to be low (1-4), light orange is considered to be medium (5-6), dark orange is considered to be high (7), and red is considered to be very high (8-9).
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
4 Figure 5: Credit Risk Scale The <Company Name> Corporate D&B Credit Risk is <n>, which is a <DnB level> level.
Table 1 summarizes the Financial risks identified for <Company Name>.
Table 1: Financial Identified High Risks Risk Area Risks Identified Risks of Concern
[Asset Freeze]
<n>
<n>
[Bankruptcy Related]
<n>
<n>
[Central Bank Reprimands]
<n>
<n>
[Counterfeit]
<n>
<n>
[Credit Downgrade]
<n>
<n>
[Divestment]
<n>
<n>
[Financial Crime]
<n>
<n>
[Financial Issue]
<n>
<n>
[Financial Regulator]
<n>
<n>
[Fine or Penalty Imposed]
<n>
<n>
[Flagged Financial]
<n>
<n>
[Indicator of Wealth]
<n>
<n>
[Insolvency]
<n>
<n>
[Liquidation]
<n>
<n>
[Money Laundering]
<n>
<n>
[Offshore Account]
<n>
<n>
[Provided Funding To]
<n>
<n>
[Received Funding From]
<n>
<n>
[Relative or Associate]
<n>
<n>
[Sec Investment Advisor]
<n>
<n>
[Source of Wealth]
<n>
<n>
[Stock Analysis]
<n>
<n>
[Stock Exchange]
<n>
<n>
[Tax Issue]
<n>
<n>
Overall Risk
<n>
<n>
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
5 2.2.1 Assessor Financial Risk Summary The risk assessment identified <Number of financial risks> financial high risks for <Company Name>. Of these, <Number of unique financial risks of concern> were determined to be unique risks of concern. The overall risk of the identified financial risks of concern is <risk level>.
Detailed information for each identified unique risk of concern is documented below.
2.2.1.1 <Risk Title>
Risk Date: <Risk Date>
<Brief Risk Description and Assessor Interpretation of Risk>
This risk presents a <risk level> risk.
2.2.1.2 <Risk Title>
Risk Date: <Risk Date>
<Brief Risk Description and Assessor Interpretation of Risk>
This risk presents a <risk level> risk.
2.2.1.3 <Risk Title>
Risk Date: <Risk Date>
<Brief Risk Description and Assessor Interpretation of Risk>
This risk presents a <risk level> risk.
2.3 Foreign Ownership, Control, and Influence (FOCI) Risk FOCI risk existence and impact is often opaque or obfuscated. Influence can be exerted through partnerships, business ties, reliance, or operational dependence. Additional risk indicators lie in funding sources, manufacturing, or logistics vulnerability based on regional disasters, climate changes, geopolitical tensions, or adversarial interests. Figure 6 shows the average FOCI risk for <Company Name>.
Figure 6: <Company Name> Average FOCI Risk
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
6 The average <Company Name> FOCI risk level is <risk level>.
Table 2 summarizes the FOCI risks identified for <Company Name>.
Table 2: FOCI Identified High Risks Risk Area Risks Identified Risks of Concern
[Business SOE]
<n>
<n>
[Entity Acquired By]
<n>
<n>
[External Trade Regulator]
<n>
<n>
[Links to Risk Sensitive Jurisdiction]
<n>
<n>
[Links to Sanctioned Jurisdiction]
<n>
<n>
[Merger/Acquisition]
<n>
<n>
[Parent]
<n>
<n>
[Privatization of State Owned Company]
<n>
<n>
[Sanctioned Country]
<n>
<n>
[State Owned Company]
<n>
<n>
[Subsidiary]
<n>
<n>
[Foreign Risk Breakdown]
<n>
<n>
Overall Risk
<n>
<n>
2.3.1 Assessor FOCI Risk Summary The risk assessment identified <Number of FOCI risks> FOCI high risks for <Company Name>.
Of these, <Number of unique FOCI risks of concern> were determined to be unique risks of concern. The overall risk of the identified FOCI risks of concern is <risk level>.
Detailed information for each identified risk of concern is documented below.
2.3.1.1 <Risk Title>
Risk Date: <Risk Date>
<Brief Risk Description and Assessor Interpretation of Risk>
This risk presents a <risk level> risk.
2.3.1.2 <Risk Title>
Risk Date: <Risk Date>
<Brief Risk Description and Assessor Interpretation of Risk>
This risk presents a <risk level> risk.
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
7 2.3.1.3 <Risk Title>
Risk Date: <Risk Date>
<Brief Risk Description and Assessor Interpretation of Risk>
This risk presents a <risk level> risk.
2.4 Operational Risk A third-partys operational weakness can impact their ability to deliver. Infrastructure resilience, cybersecurity hygiene, and management of human capital are risk indicators an organization can monitor for managing third-party risk. Figure 7 shows the average operational risk for
<Company Name>.
Figure 7: <Company Name> Average Operational Risk The average <Company Name> FOCI risk level is <risk level>.
Table 3 summarizes Operational risks identified for <Company Name>.
Table 3: Operational Identified High Risks Risk Area Risks Identified Risks of Concern
[Certification].
<n>
<n>
[Data Breach]
<n>
<n>
[Decertification]
<n>
<n>
[Employee Retention]
<n>
<n>
[Government Contractor]
<n>
<n>
[Government Department]
<n>
<n>
[High Risk Industry]
<n>
<n>
[Industry Regulator]
<n>
<n>
[International Sanctions]
<n>
<n>
[Key Hire]
<n>
<n>
[Labor Issues]
<n>
<n>
[Layoff]
<n>
<n>
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
8 Table 3: Operational Identified High Risks Risk Area Risks Identified Risks of Concern
[Management Issue]
<n>
<n>
[Management Reference]
<n>
<n>
[Moved Location]
<n>
<n>
[Negative Performance]
<n>
<n>
[Occupational Safety Issue]
<n>
<n>
[Risk Sensitive Industry]
<n>
<n>
[Risk Sensitive Jurisdiction]
<n>
<n>
[Safety Issue]
<n>
<n>
[Sanctions]
<n>
<n>
[Significant Mention]
<n>
<n>
[Sustainable Risk Industry]
<n>
<n>
Overall Risk
<n>
<n>
2.4.1 Assessor Operational Risk Summary The risk assessment identified <Number of Operational risks> Operational high risks for
<Company Name>. Of these, <Number of unique Operational risks of concern> were determined to be unique risks of concern. The overall risk of the identified Operational risks of concern is <risk level>.
Detailed information for each identified risk of concern is documented below.
2.4.1.1 <Risk Title>
Risk Date: <Risk Date>
<Brief Risk Description and Assessor Interpretation of Risk>
This risk presents a <risk level> risk.
2.4.1.2 <Risk Title>
Risk Date: <Risk Date>
<Brief Risk Description and Assessor Interpretation of Risk>
This risk presents a <risk level> risk.
2.4.1.3 <Risk Title>
Risk Date: <Risk Date>
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
9
<Brief Risk Description and Assessor Interpretation of Risk>
This risk presents a <risk level> risk.
2.5 Reputational, Criminal, and Regulatory Risk Reputational, Criminal, and Regulatory (RCR) risk can impact an organizations ability to deliver.
Monitoring adverse media, criminal records, suspensions, debarments, defective pricing, regulatory enforcements, defective pricing, regulatory enforcement actions, sanctions, and import/export violations are all effective means for managing third-party risk. Figure 8 shows the average operational risk for <Company Name>.
Figure 8: <Company Name> Average Reputational, Criminal, and Regulatory Risk The average <Company Name> RCR risk level is <risk level>.
Table 4 summarizes RCR risks identified for <Company Name>.
Table 4: Reputational, Criminal, and Regulatory Risk Identified High Risks Risk Area Risks Identified Risks of Concern
[Adverse]
<n>
<n>
[Associated With Scandal]
<n>
<n>
[Award]
<n>
<n>
[Cannabis Business]
<n>
<n>
[Child Abuse]
<n>
<n>
[Child Sex Abuse]
<n>
<n>
[Client Retention]
<n>
<n>
[Company Overview]
<n>
<n>
[Consumer Complaints]
<n>
<n>
[Conviction]
<n>
<n>
[Corruption]
<n>
<n>
[Discrimination]
<n>
<n>
[Disqualification]
<n>
<n>
[Drug Crime]
<n>
<n>
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
10 Table 4: Reputational, Criminal, and Regulatory Risk Identified High Risks Risk Area Risks Identified Risks of Concern
[Environmental Crime]
<n>
<n>
[Flagged Criminal]
<n>
<n>
[Flagged Reputational]
<n>
<n>
[Fraudulent Activity]
<n>
<n>
[Homicide]
<n>
<n>
[Human Rights]
<n>
<n>
[Human Trafficking]
<n>
<n>
[Investigation Related]
<n>
<n>
[Kidnapping]
<n>
<n>
[Labor Violations]
<n>
<n>
[Law Enforcement Action]
<n>
<n>
[Legal Issue]
<n>
<n>
[Legal Risk]
<n>
<n>
[Organized Crime]
<n>
<n>
[Political Exposure]
<n>
<n>
[Political Relation Company]
<n>
<n>
[Politically Exposed Person]
<n>
<n>
[Potential Political Exposure]
<n>
<n>
[Product Issues]
<n>
<n>
[Regulatory Action]
<n>
<n>
[Regulatory Enforcement]
<n>
<n>
[Regulatory Site]
<n>
<n>
[Reputational Issue]
<n>
<n>
[Sexual Assault]
<n>
<n>
[Terrorism]
<n>
<n>
[Torture]
<n>
<n>
[Violation Related]
<n>
<n>
[Wanted Person]
<n>
<n>
[Watch List]
<n>
<n>
Overall Risk
<n>
<n>
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
11 2.5.1 Assessor Reputational, Criminal, and Regulatory Risk Summary The risk assessment identified <Number of RCR risks> RCR high risks for <Company Name>.
Of these, <Number of unique RCR risks of concern> were determined to be unique risks of concern. The overall risk of the identified RCR risks of concern is <risk level>.
Detailed information for each identified risk of concern is documented below.
2.5.1.1 <Risk Title>
Risk Date: <Risk Date>
<Brief Risk Description and Assessor Interpretation of Risk>
This risk presents a <risk level> risk.
2.5.1.2 <Risk Title>
Risk Date: <Risk Date>
<Brief Risk Description and Assessor Interpretation of Risk>
This risk presents a <risk level> risk.
2.5.1.3 <Risk Title>
Risk Date: <Risk Date>
<Brief Risk Description and Assessor Interpretation of Risk>
This risk presents a <risk level> risk.
3 <COMPANY NAME> DEEP DIVE The Exiger Deep Dive is an Enhanced Due Diligence Report, which are reports produced by Exigers team of analysts and subject matter experts that:
Fully trace back and map ultimate beneficial ownership Incorporate DDIQ profile data and external data sources covering additional trade data, visa sponsorship information, software vendor and sales networks, cyberhygiene, and cybersecurity evaluations
{No Deep Dives was performed for <Company Name>. l The Deep Dive identified risk associated with <Company Name> includes <summary of relevant Deep Dive findings>.
3.1 <Deep Dive Title>
In <Month, Year>, Exiger <description of purpose of the Deep Dive> (<Deep Dive ML#>).
The Deep Dive identified the following key findings:
OFFICIAL USE ONLY - PROPRIETARY INFORMATION Supply Chain Risk Assessment for <Company Name>
12
- 1. <Deep Dive Key Finding>
- 2. <Deep Dive Key Finding>
- 3. <Deep Dive Key Finding>
- 1. <Deep Dive Key Finding>
- 2. <Deep Dive Key Finding>
- 3. <Deep Dive Key Finding>
- 1. <Deep Dive Key Finding>
- 2. <Deep Dive Key Finding>
- 3. <Deep Dive Key Finding>