Under active development Content is continuously updated and improved

PE-3(5)Tamper Protection

>Control Description

Tamper protection is critical for reducing cybersecurity risk in products. The enterprise should implement validated tamper protection techniques within the supply chain. For critical products, the enterprise should require and assess whether and to what extent a supplier has implemented tamper protection mechanisms. The assessment may also include whether and how such mechanisms are required and applied by the supplier’s upstream supply chain entities.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.