Product integrity and the ability to distinguish trustworthy products is a critical foundation of C-SCRM. Authoritative information regarding the provenance and integrity of components provides a strong basis for trust in a computing device whether it is a client device, server, or other technology. The goal of this project is to demonstrate how organizations can verify that the components of their acquired computing devices are genuine and have not been tampered with or otherwise modified throughout the devices’ life cycles.
This project addresses several processes:
- how to create verifiable descriptions of components and platforms, which may be done by original equipment manufacturers (OEMs), platform integrators, and even information technology (IT) departments
- how to verify devices and components within the single transaction between an OEM and a customer
- how to verify devices and components at subsequent stages in the system life cycle in the operational environment
This project will use a combination of commercial off-the-shelf and open-source tools to describe the components of a device in a verifiable manner using cryptography. Future builds of this project may cover other critical phases of C-SCRM.
Product integrity and the ability to distinguish trustworthy products is a critical foundation of cybersecurity supply chain risk management (C-SCRM).
Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.
Join the Community of Interest
A Community of Interest (COI) is a group of professionals and advisors who share business insights, technical expertise, challenges, and perspectives to guide NCCoE projects. COIs often include experts, innovators, and everyday users of cybersecurity and privacy technologies. Share your expertise and consider becoming a member of this project's COI.
The NCCoE’s Supply Chain Assurance project team and collaborators provided an update on the Validating the Integrity of Computing Devices project during an NCCoE Collaborator Series Webinar on March 18th, 2021. The team discussed the scope of the project and the roles that each collaborator is playing in developing the sample solution.
The project description gives an overview of the NCCoE Supply Chain Assurance Project, including the purpose, scope, challenges, scenarios, and more.
This project repository contains the code, scripts, and configuration files that accompany Volume C which describes the steps necessary to set up an environment that focuses on laptop and server computing devices.