U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

ITL Bulletin

Is Your Replication Device Making An Extra Copy For Someone Else?

Date Published: April 2015

Author(s)

Celia Paulsen (NIST), Larry Feldman (G2), Gregory Witte (G2)

Abstract

Keywords

3D printers; 3D scanners; copiers; countermeasures; exploits; mitigation; multifunction devices; printers; replication devices; risk; risk assessment; risk management; scanners; security controls; threats; vulnerabilities
Control Families

Access Control; Audit and Accountability; Configuration Management; Identification and Authentication; Maintenance; Physical and Environmental Protection; Planning; Risk Assessment; System and Services Acquisition

Documentation

Publication:
April 2015 ITL Bulletin (pdf)

Supplemental Material:
None available

Document History:
04/16/15: ITL Bulletin (Final)