Northrop Grumman is committed to ensuring that capable businesses of all types receive meaningful subcontracting opportunities with Northrop Grumman. To begin the process, please follow the steps outlined below. Potential suppliers (Small or Large) should utilize the Small Business Liaison Officers (SBLO) as their initial point of contact at Northrop Grumman.
If you are interested in doing business with Northrop Grumman, please read the recommended steps below.
New Supplier Registration Process through the Ariba Network
Northrop Grumman has partnered with SAP Ariba to manage our Supplier registration and on-boarding process using SAP Ariba Network. All steps below must be completed to become a Northrop Grumman supplier.
Northrop Grumman Supplier Registration Guide
This guide provides detailed instructions for completing Steps 1-4, and for ongoing use of your Ariba Network supplier account to update your information for Northrop Grumman.
- Receive Invitation from Northrop Grumman to Connect on the Ariba Network (AN)
- Create New Ariba Network Account or Log-in with Existing Account
- Complete and Submit Registration Questionnaire
- Northrop Grumman Review and Approval (May Require Follow Up)
- Maintain Your Questionnaire and Complete Additional Qualification Questionnaire As Requested
Note: Registering for an Ariba Network account does not mean you are registered as a supplier with Northrop Grumman. You will need to complete Northrop Grumman’s Registration Questionnaire and it will need to be approved before you are considered registered with Northrop Grumman.
Anti-Human Trafficking Compliance
Northrop Grumman fully supports the elimination of human trafficking and slavery, including from the supply chain. We do not tolerate trafficking in persons, including the procurement of commercial sex acts, and the use of forced or child labor. We have implemented comprehensive policies and procedures, including our Standards of Business Conduct for Suppliers and Other Trading Partners, which require our employees and suppliers to comply with applicable law, including but not limited to requirements under the Federal Acquisition Regulation (FAR) and/or UK Modern Slavery Act, and behave in an ethical manner.
Cybersecurity Resources for Suppliers
As government, prime contractors, and suppliers are increasingly targeted by cyber attacks, companies and their suppliers must work together to protect sensitive information and intellectual property. Awareness of cyber risks and implementation of effective cybersecurity controls and defenses is vital.
Northrop Grumman understands the important role our suppliers play in protecting our and our customers’ information and networks from cyber threats. We also understand the value that cybersecurity maturity plays in achieving and maintaining a competitive advantage for our company and our suppliers. Our mutual success is impacted by our ability to both identify and effectively manage cyber risks. Building a cybersecurity posture capable of mitigating risk is essential. Northrop Grumman recognizes that our suppliers must also develop and maintain their own cybersecurity postures.
Northrop Grumman has collaborated with other Defense Industrial Base (DIB) companies to establish the CyberAssist Website. This website will assist suppliers in enhancing their cyber security protections by identifying and posting links to helpful publicly available cybersecurity resources. The resources were selected both to help companies (i) meet DoD and other U.S. cybersecurity standards applicable to U.S. federal contractors (e.g., FAR Basic Safeguarding clause, DFARS Safeguarding Covered Defense Information (CDI) clause, DoD Cybersecurity Maturity Model Certification (CMMC)); and (ii) otherwise improve their current cybersecurity protections.
Another helpful resource is CI2 Project Spectrum (DoD Small Business Office Sponsored). Part of the Cyber Integrity Initiative (CI2) – and supported by the Department of Defense’s (DoD) Office of Small Business Programs (OSBP), Project Spectrum provides resources, information, training, and risk assessments to help companies and institutions improve cyber readiness and comply with DoD requirements. Suppliers to Northrop Grumman need to comply with our standard terms and conditions. Click the link on the right to view support for complying with Terms and Conditions Clause 57, Information Security.
If you have any comments or questions regarding the provided supplier resources, please click here.
Protected applications on OASIS require additional authentication.
Global Trade Security (CTPAT)
As a company with global operations and a dedication to worldwide security, Northrop Grumman is committed to complying with worldwide trade security standards. As such, Northrop Grumman is a proud participant in U.S. Customs and Border Protection’s Customs Trade Partnership Against Terrorism (CTPAT). CTPAT is a collaborative network of government and industry partners with a common goal to ensure a compliant, safe, and secure global trade economy.
International Suppliers and Logistics Service Providers
Northrop Grumman appreciates its international business partners essential role in global trade security and encourages integration of enhanced security measures at every link in the supply chain, from production to transport to final delivery.
CTPAT Minimum Security Criteria (MSC) have been designated by U.S. Customs and Border Protection as a means to address the broad landscape of supply chain threats, such as terrorism, smuggling, theft, drug trafficking, and damage. They provide a comprehensive approach to a layered, effective security program. The additional links on this page provide valuable information and guidelines for developing and evolving supply chain security.
Northrop Grumman recommends participation in CTPAT or a relevant Authorized Economic Operator (AEO) scheme.
Director, Global Import Management and Trade Security