- Primary source for C-SCRM multilevel model, acquisition integration, metrics, and templates.
References and citations
- Official publication details and document access.
- Reference control catalog used to map supplier assurance controls.
A risk-depth model for supplier due diligence, contract controls, and monitoring cadence.
Use tiering to match assurance effort to business impact and supply chain attack exposure.
Structured answer sets in this page tree.
Cited legal and guidance references.
Under SP 800-161 Rev. 1 Update 1, supplier risk tiering should be an outcome of criticality analysis, product and service risk assessment, dependency mapping, and mission or business impact - not a generic vendor classification exercise. Tiering only matters if it changes due diligence depth, contract requirements, monitoring, and escalation.
The publication points organizations toward criticality analysis and multilevel risk integration. A supplier should be tiered based on how failure, compromise, substitution, or hidden dependency could affect enterprise objectives, mission and business processes, and operational systems.
This means supplier size alone is almost never a useful tiering variable.
Assessment Autopilot can take NIST SP 800-161 Rev. 1 Supplier Risk Tiering from turning this guidance into a repeatable review process to a reusable workflow inside Sorena. Teams working on NIST SP 800-161 Rev. 1 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.
Start from NIST SP 800-161 Rev. 1 Supplier Risk Tiering and turn the guidance into owned tasks, evidence requests, and review checkpoints.
Review your current process, evidence gaps, and next steps for NIST SP 800-161 Rev. 1 Supplier Risk Tiering.
SP 800-161 expects tailored C-SCRM plans and control application. That means tiering must influence pre-award due diligence, contract controls, monitoring cadence, incident inclusion, and post-relationship requirements.
If all tiers receive the same evidence requests and monitoring, the model is only cosmetic.
The publication describes supply chain risk as dynamic and connected to the full life cycle. Supplier tiering therefore cannot be set once and forgotten. Ownership changes, new regions, new services, new subcontractors, and incident history can all change exposure materially.
The organization should treat re-tiering as part of continuous improvement and documented risk management, not as an exception.
Tiering decisions need to survive both incidents and audits. The evidence pack should show the criteria used, the analysis performed, the decision made, and the controls that followed from that decision.
That linkage is what makes the model publication-grade rather than cosmetic.