| ID | Name |
|---|---|
| T1474.001 | Compromise Software Dependencies and Development Tools |
| T1474.002 | Compromise Hardware Supply Chain |
| T1474.003 | Compromise Software Supply Chain |
Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system.
| ID | Mitigation | Description |
|---|---|---|
| M1001 | Security Updates |
Security updates may contain patches to integrity checking mechanisms that can detect unauthorized hardware modifications. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0604 | Detection of Compromise Hardware Supply Chain | AN1653 |
Integrity checking mechanisms can potentially detect unauthorized hardware modifications. |
| AN1654 |
Integrity checking mechanisms can potentially detect unauthorized hardware modifications. |