Supply Chain Risk Management (SR)

Establish agreements and procedures with entities involved in the supply chain for the system, system component, or system service for the [Selection (one or more): notification of supply chain compromises; results of assessments or audits; [Assignment: organization-defined information]].


Login

Supply Chain Risk Management (SR)

Implement a tamper protection program for the system, system component, or system service.


Login

Supply Chain Risk Management (SR)

Employ anti-tamper technologies, tools, and techniques throughout the system development life cycle.


Login

Supply Chain Risk Management (SR)

Inspect the following systems or system components [Selection (one or more): at random; at [Assignment: organization-defined frequency], upon [Assignment: organization-defined indications of need for inspection]] to detect tampering: [Assignment: organization-defined systems or system components].


Login

Supply Chain Risk Management (SR)

a. Develop and implement anti-counterfeit policy and procedures that include the means to detect and prevent counterfeit components from entering the system; and b. Report counterfeit system components to [Selection (one or more): source of counterfeit component; [Assignment: organization-defined external reporting organizations]; [Assignment: organization-defined personnel or roles]].


Login

Supply Chain Risk Management (SR)

Train [Assignment: organization-defined personnel or roles] to detect counterfeit system components (including hardware, software, and firmware).


Login

Supply Chain Risk Management (SR)

Maintain configuration control over the following system components awaiting service or repair and serviced or repaired components awaiting return to service: [Assignment: organization-defined system components].


Login

Supply Chain Risk Management (SR)

Scan for counterfeit system components [Assignment: organization-defined frequency].


Login

Supply Chain Risk Management (SR)

Level N/A

Dispose of [Assignment: organization-defined data, documentation, tools, or system components] using the following techniques and methods: [Assignment: organization-defined techniques and methods].


Login