T7.8.5 - RELIABLE DELIVERY Implementation Guidance
The entity shall ensure a reliable delivery of information systems or system components.
Back to T7.8.5 - P4 - RELIABLE DELIVERY
For some information system components, especially hardware, there are technical means to help determine if the components are genuine or have been altered. Security controls used to validate the authenticity of information systems and information system components include, for example, optical/nanotechnology tagging and side-channel analysis, hashes comparison mechanisms also can be used to verify if vender or third party software has been altered or not. For hardware, detailed bill of material information can highlight the elements with embedded logic complete with component and production location.
Back to T7.8.5 - P4 - RELIABLE DELIVERY