This is a potential security issue, you are being redirected to https://csrc.nist.gov.
Date Published: August 2021
Comments Due: September 29, 2021 (public comment period is CLOSED)
Email Questions to: email@example.com
Planning Note (8/31/2021):
8/31/21 - 9/29/21: Comment period for Volume B: Approach, Architecture, and Security Characteristics. This preliminary draft is stable but has some gaps in its content that will be addressed in the next draft.
, , , , ,
Organizations throughout the world face the challenge of identifying trustworthy computing devices to function daily. Cyber supply chains are constantly at risk of compromise, whether intentional or unintentional. Once a supply chain has been compromised, the security of that device may no longer be trusted. Some cyber supply chain risks include counterfeiting, unauthorized production, and tampering.
NIST's National Cybersecurity Center of Excellence (NCCoE) is collaborating with industry to create an example cybersecurity solution that helps organizations verify that the internal components of their computing devices are genuine and have not been tampered with. This project will result in a publicly available practice guide to help organizations decrease the risk of compromise to products in their supply chain, and in turn reduce the risk for customers and end users.
Configuration Management; System and Information Integrity
SP 1800-34A (Prelim. Draft) (pdf)