Supply Chain Assurance
Technologies today rely on complex, globally distributed and interconnected supply chain ecosystems to provide highly refined, cost effective, and reusable solutions. Organizations currently lack the ability to readily distinguish between trustworthy and untrustworthy products. Having this ability is a critical foundation of cybersecurity supply chain risk management (C-SCRM).
Helping organizations verify that the internal components of the computing devices they acquire are genuine and have not been tampered with
Product integrity and the ability to distinguish trustworthy products is a critical foundation of C-SCRM. Authoritative information regarding the provenance and integrity of components provides a strong basis for trust in a computing device whether it is a client device, server, or other technology. The goal of this project is to demonstrate how organizations can verify that the components of their acquired computing devices are genuine and have not been tampered with or otherwise modified throughout the devices’ life cycles.
This project addresses several processes:
- how to create verifiable descriptions of components and platforms, which may be done by original equipment manufacturers (OEMs), platform integrators, and even information technology (IT) departments
- how to verify devices and components within the single transaction between an OEM and a customer
- how to verify devices and components at subsequent stages in the system life cycle in the operational environment
This project will use a combination of commercial off-the-shelf and open-source tools to describe the components of a device in a verifiable manner using cryptography. Future builds of this project may cover other critical phases of C-SCRM.
Product integrity and the ability to distinguish trustworthy products is a critical foundation of cybersecurity supply chain risk management (C-SCRM).
Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.
Join the Community of Interest
A Community of Interest (COI) is a group of professionals and advisors who share business insights, technical expertise, challenges, and perspectives to guide NCCoE projects. COIs often include experts, innovators, and everyday users of cybersecurity and privacy technologies. Share your expertise and consider becoming a member of this project's COI.
Supply Chain Assurance Community of Interest Update
The NCCoE’s Supply Chain Assurance project team and collaborators provided an update on the Validating the Integrity of Computing Devices project during an NCCoE Collaborator Series Webinar on March 18th, 2021. The team discussed the scope of the project and the roles that each collaborator is playing in developing the sample solution.
The project description gives an overview of the NCCoE Supply Chain Assurance Project, including the purpose, scope, challenges, scenarios, and more.
This project repository contains the code, scripts, and configuration files that accompany Volume C which describes the steps necessary to set up an environment that focuses on laptop and server computing devices.