question
stringlengths 21
136
| answer
stringlengths 5
3.93k
|
---|---|
What is SR-9(1) Tamper Resistance and Detection | Multiple Stages of System Development Life Cycle? | The system development life cycle includes research and development, design, manufacturing, acquisition, delivery, integration, operations and maintenance, and disposal. Organizations use a combination of hardware and software techniques for tamper resistance and detection. Organizations use obfuscation and self-checking to make reverse engineering and modifications more difficult, time-consuming, and expensive for adversaries. The customization of systems and system components can make substitutions easier to detect and therefore limit damage. |
What is SR-10 Inspection of Systems or Components? | The inspection of systems or systems components for tamper resistance and detection addresses physical and logical tampering and is applied to systems and system components removed from organization-controlled areas. Indications of a need for inspection include changes in packaging, specifications, factory location, or entity in which the part is purchased, and when individuals return from travel to high-risk locations. |
What is SR-11 Component Authenticity? | Sources of counterfeit components include manufacturers, developers, vendors, and contractors. Anti-counterfeiting policies and procedures support tamper resistance and provide a level of protection against the introduction of malicious code. External reporting organizations include CISA. |
What is SR-11(1) Component Authenticity | Anti-counterfeit Training? | None. |
What is SR-11(2) Component Authenticity | Configuration Control for Component Service and Repair? | None. |
What is SR-11(3) Component Authenticity | Anti-counterfeit Scanning? | The type of component determines the type of scanning to be conducted (e.g., web application scanning if the component is a web application). |
What is SR-12 Component Disposal? | Data, documentation, tools, or system components can be disposed of at any time during the system development life cycle (not only in the disposal or retirement phase of the life cycle). For example, disposal can occur during research and development, design, prototyping, or operations/maintenance and include methods such as disk cleaning, removal of cryptographic keys, partial reuse of components. Opportunities for compromise during disposal affect physical and logical data, including system documentation in paper-based or digital files; shipping and delivery documentation; memory sticks with software code; or complete routers or servers that include permanent media, which contain sensitive or proprietary information. Additionally, proper disposal of system components helps to prevent such components from entering the gray market. |