PE-3(5)—Tamper Protection
>Control Description
Tamper protection is critical for reducing cybersecurity risk in products. The enterprise should implement validated tamper protection techniques within the supply chain. For critical products, the enterprise should require and assess whether and to what extent a supplier has implemented tamper protection mechanisms. The assessment may also include whether and how such mechanisms are required and applied by the supplier’s upstream supply chain entities.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.