PE-3(5)—Tamper Protection
>Control Description
Employ ⚙organization-defined anti-tamper technologies to ☑detect; prevent physical tampering or alteration of ⚙organization-defined hardware components within the system.
>Cross-Framework Mappings
>Supplemental Guidance
Organizations can implement tamper detection and prevention at selected hardware components or implement tamper detection at some components and tamper prevention at other components. Detection and prevention activities can employ many types of anti-tamper technologies, including tamper-detection seals and anti-tamper coatings. Anti-tamper programs help to detect hardware alterations through counterfeiting and other supply chain-related risks.
>Related Controls
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What policies and procedures govern the implementation of tamper protection for the organization's facilities?
- •Who is responsible for overseeing and maintaining tamper protection controls?
- •How frequently are tamper protection controls reviewed and updated?
- •What process exists for granting exceptions to tamper protection requirements?
- •How does the organization ensure accountability for tamper protection across all facility locations?
Technical Implementation:
- •What technologies or systems technically implement tamper protection?
- •How are these systems configured to meet the control requirements?
- •What monitoring or alerting capabilities exist for tamper protection?
- •How do tamper protection systems integrate with other physical security infrastructure?
- •What redundancy or backup mechanisms support tamper protection?
Evidence & Documentation:
- •Provide documented policies and procedures for tamper protection.
- •Provide evidence of tamper protection implementation and configuration.
- •Provide logs, records, or reports demonstrating tamper protection activities over the past 90 days.
- •Provide testing, maintenance, or inspection records for tamper protection from the past year.
- •Provide evidence of tamper protection reviews, audits, or assessments.
Ask AI
Configure your API key to use AI features.