A multinational electronics manufacturer is concerned about the risk of malicious components being inserted into their products during production at third-party facilities. The executive team wants to implement a technical measure that provides hardware-level verification of component authenticity. Which approach would most effectively address this specific supply chain risk?
Requiring a software bill of materials from suppliers
Implementing minimum contractual standards with vendors
Conducting third-party assessments of supplier facilities
The correct answer is implementing silicon root of trust technology. Silicon root of trust provides hardware-based security by establishing a chain of trust that begins at the hardware level with tamper-resistant cryptographic keys embedded directly in silicon chips during manufacturing. This technology helps detect unauthorized modifications to hardware components and can verify the authenticity of firmware and software loaded onto devices, making it particularly effective against hardware implants and malicious code insertion during the manufacturing process.
The other options, while valuable supply chain practices, do not specifically address the hardware tampering risk:
Requiring a software bill of materials from suppliers documents software components but doesn't protect against hardware-level tampering.
Conducting third-party assessments of supplier facilities might help identify some process issues but doesn't provide ongoing technical protection against sophisticated hardware tampering.
Implementing minimum contractual standards establishes baseline expectations but doesn't provide technical protection to prevent or detect hardware tampering.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is silicon root of trust technology?
Open an interactive chat with Bash
How does a silicon root of trust help prevent hardware tampering?
Open an interactive chat with Bash
Why are the other options not effective against hardware tampering?
Open an interactive chat with Bash
ISC2 CISSP
Security Architecture and Engineering
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access