Component Authenticity
Description
Develop and implement anti-counterfeit policies and procedures; train personnel to detect counterfeit components.
⚠️ Risk Impact
Counterfeit hardware (especially network gear, USB cables, payment terminals) carries pre-installed backdoors. Government supply-chain attacks specifically target hardware authenticity verification gaps.
🔍 How EchelonGraph Detects This
EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as medium-severity findings with remediation guidance.
🔧 Remediation
Procure from authorized distributors only. Verify hardware authenticity via vendor portal or hash check. For high-security: require tamper-evident packaging + chain-of-custody documentation.
💀 Real-World Attack Scenario
Bloomberg reported (2018, contested) that counterfeit Supermicro motherboards contained spy chips. Whether or not that specific report was accurate, multiple confirmed cases exist of counterfeit Cisco gear with pre-installed backdoors entering enterprise networks via gray-market resellers. Federal contractors are specific targets.
💰 Cost of Non-Compliance
Counterfeit-hardware breaches: averaged $5.8M in 2024 government cases (CISA enforcement data). FedRAMP SR-11 deficiencies result in vendor disqualification.
📋 Audit Questions
- 1.What hardware procurement controls verify authenticity?
- 2.Are gray-market hardware sources prohibited?
- 3.How is chain-of-custody documented?
- 4.Show evidence of counterfeit-detection training.
🎯 MITRE ATT&CK Mapping
⚡ Common Pitfalls
- ⛔Buying network gear from cheapest reseller without vendor-authorization verification
- ⛔No tamper-evident packaging documentation
- ⛔Staff untrained to spot counterfeits
📈 Business Value
Component authenticity controls close the rarest but highest-impact attack vector. Material for organizations handling sensitive operational technology or government-classified data.
⏱️ Effort Estimate
8-16 hours policy + training
EchelonGraph tracks vendor-authorization status of procured hardware (via integration with procurement systems)
🔗 Cross-Framework References
Automate NIST 800-53 SR-11 compliance
EchelonGraph continuously monitors this control across all your cloud accounts.
Start Free →