SA-12(10)—Supply Chain Protection
Secret (P2)
Management
>Control Description
SUPPLY CHAIN PROTECTION | VALIDATE AS GENUINE AND NOT ALTERED The organization employs ⚙organization-defined security safeguards to validate that the information system or system component received is genuine and has not been altered.
>Supplemental Guidance
For some information system components, especially hardware, there are technical means to help determine if the components are genuine or have been altered. Security safeguards used to validate the authenticity of information systems and information system components include, for example, optical/nanotechnology tagging and side-channel analysis. For hardware, detailed bill of material information can highlight the elements with embedded logic complete with component and production location.
Ask AI
Configure your API key to use AI features.