🏛️NIST 800-53 SR-11Rule: NIST-SR-011medium

Component Authenticity

Description

Develop and implement anti-counterfeit policies and procedures; train personnel to detect counterfeit components.

⚠️ Risk Impact

Counterfeit hardware (especially network gear, USB cables, payment terminals) carries pre-installed backdoors. Government supply-chain attacks specifically target hardware authenticity verification gaps.

🔍 How EchelonGraph Detects This

NIST-SR-011Automated scanner rule

EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as medium-severity findings with remediation guidance.

🔧 Remediation

Procure from authorized distributors only. Verify hardware authenticity via vendor portal or hash check. For high-security: require tamper-evident packaging + chain-of-custody documentation.

💀 Real-World Attack Scenario

Bloomberg reported (2018, contested) that counterfeit Supermicro motherboards contained spy chips. Whether or not that specific report was accurate, multiple confirmed cases exist of counterfeit Cisco gear with pre-installed backdoors entering enterprise networks via gray-market resellers. Federal contractors are specific targets.

💰 Cost of Non-Compliance

Counterfeit-hardware breaches: averaged $5.8M in 2024 government cases (CISA enforcement data). FedRAMP SR-11 deficiencies result in vendor disqualification.

📋 Audit Questions

  • 1.What hardware procurement controls verify authenticity?
  • 2.Are gray-market hardware sources prohibited?
  • 3.How is chain-of-custody documented?
  • 4.Show evidence of counterfeit-detection training.

🎯 MITRE ATT&CK Mapping

T1195.003 — Compromise Hardware Supply Chain

⚡ Common Pitfalls

  • Buying network gear from cheapest reseller without vendor-authorization verification
  • No tamper-evident packaging documentation
  • Staff untrained to spot counterfeits

📈 Business Value

Component authenticity controls close the rarest but highest-impact attack vector. Material for organizations handling sensitive operational technology or government-classified data.

⏱️ Effort Estimate

Manual

8-16 hours policy + training

With EchelonGraph

EchelonGraph tracks vendor-authorization status of procured hardware (via integration with procurement systems)

🔗 Cross-Framework References

ISO27001-A.5.21

Automate NIST 800-53 SR-11 compliance

EchelonGraph continuously monitors this control across all your cloud accounts.

Start Free →