Date Published: November 22, 2021
Comments Due: January 17, 2022 (public comment period is CLOSED)
Email Questions to:
supplychain-nccoe@nist.gov
Planning Note (11/22/2021):
The Comment period for Volume C: How-To Guides, is open through 1/17/22. This preliminary draft is stable but has some gaps in its content that will be addressed in the next draft.
This preliminary draft of Volume C of SP 1800-34, Validating the Integrity of Computing Devices, includes specific product installation, configuration, and integration instructions for building the example implementation. By releasing each volume of the practice guide as a preliminary draft, we can share the progress made to date and use the feedback received to shape other volumes of the practice guide.
Ensuring the Integrity of the Cyber Supply Chain
Technologies today rely on complex, globally distributed and interconnected supply chain ecosystems to provide reusable solutions. Organizations are increasingly at risk of cyber supply chain compromise, whether intentional or unintentional. Cyber supply chain risks include counterfeiting, unauthorized production, tampering, theft, and insertion of unexpected software and hardware. Managing these risks requires ensuring the integrity of the cyber supply chain and its products and services. This practice guide can benefit organizations who want to verify that the internal components of their computing devices are genuine and have not been altered during the manufacturing and distribution process.
Share Your Expertise
Please visit our webpage and scroll to the status section to download the document and share your expertise with us to strengthen the Volume C preliminary draft. The public comment period for the Volume C preliminary draft is open through January 17, 2022. To receive news and updates about this project, please join the Supply Chain Assurance Community of Interest by sending an email to supplychain-nccoe@nist.gov.
Configuration Management; System and Information Integrity
Publication:
SP 1800-34C (Prelim. Draft) and other volumes (pdf)
Supplemental Material:
Project homepage
Document History:
11/22/21: SP 1800-34 (Draft)
06/23/22: SP 1800-34 (Draft)
12/09/22: SP 1800-34 (Final)
asset management, configuration management, cybersecurity supply chain risk management, roots of trust, vulnerability management
Technologies