The IT Law Wiki
Tag: Source edit
mNo edit summary
Tag: Source edit
Line 1: Line 1:
 
== Citation ==
 
== Citation ==
   
[[National Institute of Standards and Technology]], '''NIST Special Publication 1800-34A:''' (Preliminary Draft) Validating the Integrity of Computing Devices (Aug. 31, 2021). ([https://www.nccoe.nist.gov/sites/default/files/library/sp1800/nist-sp1800-34a-tpm-sca-preliminary-draft.pdf full-text]).
+
[[National Institute of Standards and Technology]], '''NIST Special Publication 1800-34:''' (Preliminary Draft) Validating the Integrity of Computing Devices (Aug. 31, 2021). ([https://www.nccoe.nist.gov/sites/default/files/library/sp1800/nist-sp1800-34a-tpm-sca-preliminary-draft.pdf full-text]).
   
 
== Overview ==
 
== Overview ==

Revision as of 03:38, 19 September 2021

Citation

National Institute of Standards and Technology, NIST Special Publication 1800-34: (Preliminary Draft) Validating the Integrity of Computing Devices (Aug. 31, 2021). (full-text).

Overview

Organizations are increasingly at risk of cyber supply chain compromise, whether [[intentional] or unintentional. Cyber supply chain risks include counterfeiting, unauthorized production, tampering, theft, and insertion of unexpected software and hardware. Managing these risks requires ensuring the integrity of the cyber supply chain and its products and services. This project will demonstrate how organizations can verify that the internal components of the computing devices they acquire are genuine and have not been unexpectedly altered during manufacturing or distribution processes.