DoD and GSA Take Aim at Supply Chain Risks
Client Alert | 1 min read | 01.15.21
The Department of Defense (DoD) recently implemented additional procedures for the mitigation of cybersecurity risks in its supply chain. Designed to identify and mitigate cybersecurity and related supply chain risks throughout a program’s lifecycle, DoD Instruction 5000.90, Cybersecurity Acquisition Decision Authorities and Program Managers, requires program managers to:
- Assess contractors’ cybersecurity posture, including, where applicable, verifying compliance with the DoD’s newly introduced Cybersecurity Maturity Model Certification (CMMC);
- Consider the extent to which contractors have experienced “significant” incidents resulting in network breaches or data loss;
- Avoid program requirements that may necessitate the use of contractors or suppliers that are owned or controlled by a foreign adversary government or are subject to the jurisdiction of a foreign adversary government;
- Manage any supply chain risks associated with foreign ownership, control, or influence (FOCI); and
- Mitigate supply chain risks using a framework that prescribes escalating risk management actions across four risk tolerance levels.
Alongside the DoD, the General Services Administration (GSA) recently introduced, as part of a draft solicitation for the Polaris small business government-wide IT contract, its own Vendor Risk Assessment Program (VRAP). According to the draft solicitation, the VRAP is designed to identify, assess, and monitor supply chain risks associated with FOCI, cybersecurity, and other factors, such as financial performance.
Contacts

Partner, Crowell Global Advisors Senior Director
- Washington, D.C.
- D | +1.202.624.2698
- Washington, D.C. (CGA)
- D | +1 202.624.2500
Insights
Client Alert | 13 min read | 10.30.25
Federal and State Regulators Target AI Chatbots and Intimate Imagery
In the first few years following the public launch of generative artificial intelligence (AI) in the autumn of 2022, litigation related to AI focused primarily on claims of copyright infringement. Suits revolved around allegations that the data on which AI models train, and/or the output they produce, infringe upon the intellectual property rights of others. (While some of these cases have settled or reached preliminary judgments, many remain ongoing.)
Client Alert | 3 min read | 10.30.25
Is Course Hero Heading to Summer School After Summary Judgment Loss?
Client Alert | 6 min read | 10.29.25
Enhancing UK cyber security resilience and leadership engagement
Client Alert | 9 min read | 10.28.25
Key Takeaways from a Consequential Month of Russia-Related Sanctions


